Tutorial in NetBIOS Hacking | Tutorial in Hacking with Net-Devil-1.5
:: Tutorial in NetBIOS Hacking ::
This is the most simple method of hacking next to using a Trojan (not really hacking). It allows you to connect to a remote PC if it has file and print sharing on. The victims computer cant have a firewall or a properly configured router and has to have a shared folder. These conditions arent as rare as you may think. The only thing you need that PCs IP.
To see if a certain PC has file and print sharing on use the nbtstat command in the DOS Prompt:
nbtstat -a 12.345.67.89
(12.345.67.89 being the persons IP)
If the PC doesn't have file and print sharing on you'll get:
"Host not found"
Otherwise you'll get:
NetBIOS Remote Machine Name Table
Name Type Status
------------------------------------------------------
Host <20> UNIQUE Registered
Workgroup <1E> GROUP Registered
System <03> UNIQUE Registered
The only thing you get from this is the name of the host which has a code of 20. (the other codes can be diffrent, but they don't matter, If the number isnt 20 the victim doesnt have file and print sharing available.)
Now you must search for a file which is called lmhost. With win 9x/me it should be in the windir, so x:\windir\lmhost, (this file has no extension, so when you search for it you have to have *.* set as file type.)
With Win NT/2000/XP (like I have) this file is in x:\windir\system32\drivers\etc\lmhost
Once you have found the file open it in notepad. There will be lots of text, scroll to the end of the it and type in the name of the host, press tab and type in it's IP. It should look like this:
host 12.345.67.89
Save and close the file. Now seach for the PC. If you have 2000/XP search for computer or other people. If you have 9x/ME go to find and search for the computer, or Search for it's IP and you should get a result with the host as the PCs name. (sometimes it's just the IP instead the hosts name) Double click on it. You're on your targets pc now and can browse it as your own.
Have fun with this, rename files, install your own Trojan or keylogger for them, delete any important files that make them better than you in anything. Search through their internet files and get access to any of their passwords they might have saved. This method of hacking is good since they cant detect it.
I bet 80% of the people that read this didnt know what the hell NetBIOS was and still dont know how to use it for hacking. 90% of the people who are reading this will leave this site thinking they are 1337 or at least think they are no longer noobs. If you can hack your obviously not a n00b, but that doesnt make you 1337.
|