Main » 2011 November 17 » NETBIOS HACKING- THE ETHICAL HACKING
3:35 PM NETBIOS HACKING- THE ETHICAL HACKING | |
NETBIOS HACKING- THE ETHICAL HACKING THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER.NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER. STEP-BY-STEP NETBIOS HACKING PROCEDURE1.Open command prompt 2. In the command prompt use the "net view” command ( OR YOU CAN ALSO USE "NB Scanner” OPTION IN "IP-TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS.BY THIS METHOD YOU CAN SCANNUMBER OF COMPUTERS AT A TIME). Example: C:>net view \59.43.45.212 The above is an example for operation using command prompt.”net view” is one of the netbios command to view the shared resources of the remote computer.Here "59.43.45.212? is an IP address of remote computer that is to be hacked through Netbios.You have to substitute a vlaid IP address in it’s place.If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown.If not an error message is displayed. So repeat the procedure 2 with a different IP address. 3. After succeeding, use the "net use” command in the command prompt.The "net use” is another netbios command which makes it possible to hack remote drives or printers. Example-1: C:>net use D: \59.43.45.212F Example-2: C:>net use G: \59.43.45.212SharedDocs Example-3: C:>net use I: \59.43.45.212Myprint NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on your computer to access remote computer’s hard-disk. NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES INCLUDING HARD-DISK DRIVES,FLOPPY DRIVES AND ROM-DRIVES ON YOUR COMPUTER.THAT IS IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE COMMAND PROMPT F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack. "Myprint” is the name of remote computer’s printer.These are displayed after giving "net use” command. "59.43.45.212? is the IP address of remote computer that you want to hack. 4. After succeeding your computer will give a message that "The commandcompleted successfully". Once you get the above message you are only one step away from hacking the computer. [ad code=1 align=center] Now open "My Computer” you will see a new "Hard-Disk drive”(Shared) with the specified name.You can open it and access remote computer’s Hard-Drive.You can copy files,music,folders etc. from victim’s hard-drive.You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is enabled on victim’s system.You can access filesfolders quickly through "Command Prompt”. NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In Gaining Access To Remote Computer Through Netbios.That is Netbios Hacking Is Not Possible In This Situation.(An Error Message Is Displayed).So Repeat The Procedure 2,3 With Different IP Address. Whoaa!! You are the KING!![ad code=1 align=center] | |
|
Total comments: 0 | |