For those who know a little or a lot about computers will agree with me that most Kenyans are 2 or more years behind when it comes to computer security, whether it be online or offline. From a personal experience, i have been to about ten or more offices and about 20 cyber cafes to test penetration, i do this as a hobby and i have realized that its so easy to steal peoples information if only it was important. the advantage is that most business transactions locally are not done online, thanks to computer illiteracy of many Kenyans. in this first part of "Guide to hacking" i want to start by showing you simply how your computer might be exposed to some potential hacker.1. Netbois Hacking
This is the simplest and one of the most effective way of gaining acces to a remote computer
STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-
TOOLS” SOFTWARE BY ENTERING RANGE OF IP
ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP-
TOOLS” SOFTWARE BY ENTERING RANGE OF IP
ADDRESSS.BY THIS METHOD YOU CAN SCAN NUMBER
OF COMPUTERS AT A TIME).
Example: C:\>net view \\219.64.55.112
The above is an example for operation using command
prompt.”net view” is one of the netbios command to view the
shared resources of the remote computer.Here “219.64.55.112″ is
an IP address of remote computer that is to be hacked through
Netbios.You have to substitute a vlaid IP address in it’s place.If
succeeded a list of HARD-DISK DRIVES & PRINTERS are
prompt.”net view” is one of the netbios command to view the
shared resources of the remote computer.Here “219.64.55.112″ is
an IP address of remote computer that is to be hacked through
Netbios.You have to substitute a vlaid IP address in it’s place.If
succeeded a list of HARD-DISK DRIVES & PRINTERS are
shown.If not an error message is displayed. So repeat the
procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command
prompt.The “net use” is another netbios command which makes it
possible to hack remote drives or printers.
prompt.The “net use” is another netbios command which makes it
possible to hack remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network DriveNames that are to be created on your computer to access remotecomputer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY
OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY
DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS
IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY
DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED
DRIVE IN THE COMMAND PROMPT
OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY
DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS
IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY
DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED
DRIVE IN THE COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s
drives that you want to hack. “Myprint” is the name of remote
computer’s printer.These are displayed after giving “net use”
command. “219.64.55.112″ is the IP address of remote computer
that you want to hack.
drives that you want to hack. “Myprint” is the name of remote
computer’s printer.These are displayed after giving “net use”
command. “219.64.55.112″ is the IP address of remote computer
that you want to hack.
4. After succeeding your computer will give a message that “The
command completed successfully“. Once you get the above
message you are only one step away from hacking the computer.
command completed successfully“. Once you get the above
message you are only one step away from hacking the computer.
Now open “My Computer” you will see a new “Hard-Disk
drive”(Shared) with the specified name.You can open it and access
remote computer’s Hard-Drive.You can copy files,music,folders
etc. from victim’s hard-drive.You can delete/modify data on
victim’s hard-drive only if WRITE-ACCESS is enabled on
victim’s system.You can access files\folders quickly through
“Command Prompt”.
drive”(Shared) with the specified name.You can open it and access
remote computer’s Hard-Drive.You can copy files,music,folders
etc. from victim’s hard-drive.You can delete/modify data on
victim’s hard-drive only if WRITE-ACCESS is enabled on
victim’s system.You can access files\folders quickly through
“Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer
Will Not Succeed In Gaining Access To Remote Computer
Through Netbios.That is Netbios Hacking Is Not Possible In This
Situation.(An Error Message Is Displayed).So Repeat The
Procedure 2,3 With Different IP Address.
Will Not Succeed In Gaining Access To Remote Computer
Through Netbios.That is Netbios Hacking Is Not Possible In This
Situation.(An Error Message Is Displayed).So Repeat The
Procedure 2,3 With Different IP Address.
HAPPY NETBOS HACKING!
when i return i will show you a new and a more complete
No comments:
Post a Comment