Tuesday 7 January 2014

HACK INTO SOMEONES COMPUTER ON LAN NETWORK

HOW TO
-------------- Hacking into a computer ----------

This tutorial is for readers as well who have only the basic knowledge, they will also be able to understand how hackers hack with NetBIOS. Using NetBIOS is probably the easies way to hack into a computer.

WHAT IS NetBIOS?

NetBIOS stands for Network Basic Input Output System. It allows applications on separate computers to communicate over a local area network. NetBIOS was developed in 1983 by Sytek Inc, as an API for software communication over IBM's PC-Network LAN technology. As many other service it also works on a port (port 139).Most people don’t even know but when they are connected to the internet they could have their hard drive shared. So if we can find a way into the network than we can do anything with the computer.

LETS BEGIN

1. You need to download cain and abel. It’s a really useful program.
(See link in comments)

Once you got it open it. It has a sniffer built inside of it. An IP sniffer looks for every ip address in your local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross. Another window will pop up, make sure “All host in my subnet” is selected, and then click ok. It will scan for computers printers etc. Now choose an Ip address that you would like to hack.

When you got your target go to start ->run and type “cmd” without quotes. This will open the command prompt which we will be using for the whole tutorial.

2. If you don’t know if your target is turned on then you can check it with the ping command, just type:ping IP address into the command prompt.
C:\Users\xxxxx>ping 192.168.1.11
Pinging : bytes=32 time<1ms TTL=128Reply from : bytes=32 time<1ms TTL=128Reply from : bytes=32 time<1ms TTL=128Reply from : bytes=32 time<1ms TTL=128:Packets: Sent = 4, Received = 4, Lost = 0 (0% losApproximate round trip times in milli-seconds:Minimu­m = 0ms, Maximum = 0ms, Average = 0ms
NetBIOS Remote Machine Name Table
Share name Type Used as Comment\CIf the command was successful than we will get the confirmation - The command was completed successfully.\ipc$ "" /­user:""You may replace k letter by any other letter. If you did everything correctly than by now you should have a drive named K:. You should be able to do anything to the computer’s C drive including hacking the hell out of it, or putting a key-logger on the drive.................­....................­....................­....................­....................­....................­....................
http://192.168.1.11/
192.168.1.11

No comments:

Post a Comment