Advertisement
MLWALK3R

Hack A computer Via CMD

Mar 9th, 2012
236
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.13 KB | None | 0 0
  1. ----------------------------------------------------------------------------------------------------------------------------------------- Hacking into a computer ----------------------------------------------------------------------------------------------------------------------------------------- This tutorial is for readers as well who have only the basic knowledge, they will also be able to understand how hackers hack with NetBIOS. Using NetBIOS is probably the easies way to hack into a computer. What is NetBIOS? NetBIOS stands for Network Basic Input Output System. It allows applications on separate computers to communicate over a local area network. NetBIOS was developed in 1983 by Sytek Inc, as an API for software communication over IBM's PC-Network LAN technology. As many other service it also works on a port (port 139). Most people don’t even know but when they are connected to the internet they could have their hard drive shared. So if we can find a way into the network than we can do anything with the computer. Lets begin. 1. You need to download cain and abel. It’s a really useful program. http://www.oxid.it/cain.html Once you got it open it. It has a sniffer built inside of it. An IP sniffer looks for every ip address in your local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross. Another window will pop up, make sure “All host in my subnet” is selected, and then click ok. It will scan for computers printers etc. Now choose an Ip address that you would like to hack. When you got your target go to start ->run and type “cmd” without quotes. This will open the command prompt which we will be using for the whole tutorial. 2. If you don’t know if your target is turned on then you can check it with the ping command, just type: ping IP address into the command prompt. C:\Users\xxxxx>ping 192.168.1.11 Pinging 192.168.2.22 with 32 bytes of data: Reply from 192.168.1.11: bytes=32 time<1ms TTL=128 Reply from 192.168.1.11: bytes=32 time<1ms TTL=128 Reply from 192.168.1.11: bytes=32 time<1ms TTL=128 Reply from 192.168.1.11: bytes=32 time<1ms TTL=128 Ping statistics for 192.168.1.11: Packets: Sent = 4, Received = 4, Lost = 0 (0% los Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms C:\Users\xxxxx> If the target is not turned on than you will get a message that says “Requested time out” without quotes. 3. Now we need to find more information, for this we use the NBTSTAT command. For more help with the NBTSTAT command type: nbtstat/? If you want to get the NetBIOS information of your target type: nbtstat –a IP address For example: nbtstat –a 192.168.1.11 NetBIOS Remote Machine Name Table Name Type Status --------------------------------------------- JHON -PC <00> UNIQUE Registered WORKGROUP <00> GROUP Registered WORKGROUP <1E> GROUP Registered JHON-PC <20> UNIQUE Registered MAC Address = 00-19-D2-51-5A-34 Now we got a lot of information, JHON-PC is the name of the computer, on the right there is a <20> it shows us that JHON-PC is shared. If you don’t get a <20> then you have to try another target. Under JHON-PC there is the computers workgroup which is called WORKGROUP in this case. If you don’t know which one is the workgroup and computer look bellow the Type category if it says UNIQUE than it’s a computer or printer, if it says GROUP than it is the workgroup. Our next step would be to to view the drive or folders the slave is sharing. To do this type: ”net view \\IP addres” For example net view \\192.168.1.11 Share name Type Used as Comment ----------------------------------------- C Disk The command completed successfully. Now we know that the target is sharing his or her C drive which we will hack into. Now lets share the victims computer's hard disk or printer. After we have connected successfully a drive will be created on our computer and on double clicking on it we will be able to view the contents of the drive. If we have connected our newly formed drive to the slave's share name JHON-PC it means that we our drive will have the same contents as that of the JHON-PC . Lets do it. We will use the NET command to do our work . Lets suppose we want to make a drive k: on our computer and connect it to the slave we will issue the command : net use “K:\\ip\C” For example: net use K: \\192.168.1.11\C If the command was successful than we will get the confirmation - The command was completed successfully. Sometimes when we use "net use k: \\ipaddress\sharename" we are asked for a password. IPC$ is there to help us. It is not at all a password cracker. It is simply a string that tells the remote operating system to give guest access, that will give access without asking for password. We use IPC$ in this way: c:\users\xxxxx>net use k: \\192.168.1.11\ipc$ "" /user:"" You may replace k letter by any other letter. If you did everything correctly than by now you should have a drive named K:. You should be able to do anything to the computer’s C drive including hacking the hell out of it, or putting a key logger on the drive.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement