Many people new to hacking wonder how hacker penetrate into another computer!! Today am gonna show you a method how can one hack into another computer!!
well, this method is khown as Netbios hacking. These are basic techniques but very useful when penetration testing any Windows based network, the techniques were discovered on WinNT but are still very valid on Windows2000 and in some cases Windows2003 due to backwards compatibility.
So lets start, First we will need to get the victims ip address, so try to get ip address, oki now how to get someone ip address,
There are many ways to get someone ip address, by software, by mail and much more.
Oki make as if someone ha s sent you a mail and you want to get his or her ip address, just do like this....
Finding IP address in Gmail
1.Log into your Gmail account with your username and password.
2.Open the mail.
3.To display the email headers,
4.Click on the inverted triangle beside Reply. Select Show Orginal.
5.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to 5.
6.Look for Received: from followed by the IP address between square brackets [ ].
7.If you find more than one Received: from patterns, select the last one.
8. Now you may trace the Victim, just go to this linkhttp://www.geobytes.com/iplocator.htm?getlocation
Finding IP address in Yahoo! Mail
1.Log into your Yahoo! mail with your username and password.
2.Click on Inbox or whichever folder you have stored your mail.
3.Click on the Subject of the email you want to track and right-click. You should get a menu like this.
4.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to the next step.
Look for Received: from followed by the IP address between square brackets [ ].
5.That should most likely be the IP address of the sender.
If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.
now you may trace him or her http://www.geobytes.com/iplocator.htm?getlocation
Finding IP address in Hotmail
1.Log into your Hotmail/Windows Live account with your username and password.
2.Click on the Inbox link on the left.
3.Under the column that says "Sort by", find the email that you want to track and right-click on it. You should get a menu that has something like Mark as read, Mark as unread, and so on. The last option in the menu should be View message source. Select it.
You should see the email headers now.
4.You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address
5.If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
6.If that doesn't work, look for Received: from followed by IP address within square brackets[].
* If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
You should see the email headers now.
You may copy the headers and use my IP address detection script to ease the process. Or if you want to manually find the IP address, proceed to step 6.
If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
If that doesn't work, look for Received: from followed by IP address within square brackets[].
* If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.
Now you may even search for ip address by software, download angry ip scanner fro here,
http://download.cnet.com/Angry-IP-Scanner/3000-2085_4-10045978.html
now goto start and click on run and then type cmd and press enter
type
ping 192.168.1.1
type your ip address in the place of 192.168.1.1.
You must get packets: Senty =4, Received =0 (0% Loss)
Now type the following command
nbtstat -a 192.168.1.1
Replace 192.168.1.1 with the victims IP address.
If you see this your in NetBIOS Remote Machine Name Table
Name Type Status ---------------------------------------------------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = xx-xx-xx-xx-xx-xx
---------------------------------------------------------------
If you don't get the number <20>.
The victim disabled the File And Printer Sharing, find another victim.
Finally it’s time. By now we know: that our target is online, our target has file sharing, and our target’s computer name. So it’s time to break in. We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\192.168.1.1” without quotes.
We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.
All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.1\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.
As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks. If it worked, it will say “The command completed successfully.” If not, you will have to go retrace you steps. Now open up “my computer” under the start menu, and your newly created network drive should be there.
Commands used in this tutorial:
PING
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME).
Categories:
0 Comments:
Post a Comment