Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Step 1:- Finding the target
- So first off we need to find a computer or the computer to hack into. So if your
- plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and
- Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local sub net. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross.
- http://1.bp.blogspot.com/-ggb-7ElZwtQ/VVrk0hE-DEI/AAAAAAAAAUQ/f0cYZQ51XoY/s1600/1-500x326.png
- Another window will pop up, make sure “All host in my subnet” is selected, and then
- click ok.
- http://1.bp.blogspot.com/-NLf-Oliu0sA/VVrk03vkc8I/AAAAAAAAAUU/vsJgCf1m6pI/s1600/2.png
- It should begin to scan.
- http://1.bp.blogspot.com/-TgpSbw6CUUc/VVrk0PA1v6I/AAAAAAAAAUI/AeGFU9DLLT8/s1600/3-500x172.png
- Then IP’s, computer names, and mac addresses will show up
- Now remember the IP address of the computer you are going to be breaking into.
- If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
- During the next step we will begin our trial and error.
- http://2.bp.blogspot.com/-KlT45iBFToY/VVrk1cGXOEI/AAAAAAAAAUc/XGQ1CMq_I70/s1600/4-500x212.png
- Step 2:- Trial and error
- Now, we don’t know if we have our designated target, or if we have a computer or
- printer, or whatever else is on the LAN or WAN.
- If you did get the IP of the target though, I still recommend reading through this
- section, for it could be helpful later on.
- Click on the start menu and go to run, type in cmd, and click ok.
- This should bring up the command prompt.
- From here we will do most of the hacking.
- Now I will be referring to certain commands that need to be inputted into the
- command prompt.
- I will put these commands in quotes, but do not put the quotes in the code when you
- type it into the prompt.
- I am only doing this to avoid confusion.
- Let’s get back to the hacking.
- Type in “ping (IP address of the target).” For example in this tutorial, “ping
- 192.168.1.103.”
- This will tell us if the target is online.
- If it worked, it will look something like this (note, I have colored out private
- information):
- http://2.bp.blogspot.com/-q58PgprX5sQ/VVrk25vTJJI/AAAAAAAAAUo/yV7wy52fvec/s1600/5-500x252.png
- IF it didn’t work, meaning that the target is not online, it will look something like this:
- http://1.bp.blogspot.com/-Yu4hW-oeLas/VVrk3pmWSsI/AAAAAAAAAUw/IgGCu6p46dk/s1600/6-500x251.png
- If the target is not online, either switch to a different target, or try another time.
- If the target is online, then we can proceed.
- Step 4:- Gathering the information
- Now, input this command “nbtstat –a (IP address of target).” An example would be
- “nbtstat –a 192.168.1.103.”
- This will show us if there is file sharing enabled, and if there is, it will give us the:
- currently logged on user, workgroup, and computer name.
- http://1.bp.blogspot.com/-c_bBp2IQL-M/VVrnxzJw4qI/AAAAAAAAAVc/Bp0LzQF5rAM/s1600/7-500x251.png
- Step 5:- Getting In
- Finally it’s time.
- By now we know: that our target is online, our target has file sharing, and our target’s
- computer name.
- So it’s time to break in.
- We will now locate the shared drives, folders, files, or printers. Type in “net view
- (IP Address of Target)”
- An example for this tutorial would be: “net view 192.168.1.103”
- http://2.bp.blogspot.com/-pp5YWdDUKVA/VVrnyaWt6WI/AAAAAAAAAVg/6gYSFqTkDgw/s1600/8-500x254.png
- We have our just found our share name. In this case, under the share name is “C,”
- meaning that the only shared thing on the computer is C. Then to the right, under
- Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C
- DISK can sometimes be an entire person’s hard drive.
- http://3.bp.blogspot.com/-Vsn-k08sn3o/VVrnz3kKpdI/AAAAAAAAAV0/-G_OYPp8MIQ/s1600/9-500x253.png
- As you can see, for my hack I have already used “K,” so I used “G” instead.
- You may also do the same for multiple hacks.
- If it worked, it will say “The command completed successfully.”
- If not, you will have to go retrace you steps.
- Now open up “my computer” under the start menu, and your newly created network
- drive should be there.
- http://3.bp.blogspot.com/-Wvs6kSZAfjk/VVrnysW00RI/AAAAAAAAAVo/vB9saVHaOZM/s1600/10-500x553.png
- Now, if you disconnect from the WAN or LAN, you will not be able to access this
- drive, hence the name Network Drive.
- The drive will not be deleted after you disconnect though, but you won’t be able to
- access it until you reconnect to the network.
- So if you are doing this for the content of the drive, I recommend dragging the files
- and folders inside of the drive onto your computer,
- because you never know if the target changes the sharing setting.
- Congratulations! You’re DONE!
- -Commands used in this tutorial:
- PING
- NBTSTAT -a (IP Address of Target)
- NET VIEW (IP Address of Target)
- NET USE K: (IP Address of Target)(SHARENAME)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement