; NETBIOS HACK
Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out
Your Federal Quarterly Tax Payments are due April 15th Get Help Now >>

NETBIOS HACK

VIEWS: 55 PAGES: 1

  • pg 1
									STEP-BY-STEP NETBIOS HACKING PROCEDURE

1.Open command prompt

2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY
ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF
COMPUTERS AT A TIME).

Example: C:\>net view \\219.64.55.112

The above is an example for operation using command prompt. “net view” is
one of the netbios command to view the shared resources of the remote
computer. Here “219.64.55.112? is an IP address of remote computer that
is to be hacked through Netbios. You have to substitute a vlaid IP
address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS
are shown. If not an error message is displayed. So repeat the procedure
2 with a different IP address.

3. After succeeding, use the “net use” command in the command prompt. The
“net use” is another netbios command which makes it possible to hack
remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint


NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that
are to be created on your computer to access remote computer’s hard-disk.

NOTE: GIVE DRIVE NAMES THAT ARE NOT   USED BY ANY OTHER DRIVES INCLUDING
HARD-DISK DRIVES, FLOPPY DRIVES AND   ROM-DRIVES ON YOUR COMPUTER. THAT IS,
IF YOU HAVE C: & D: AS HARD DIRVES,   A: AS FLOPPY DIVE AND E: AS CD-DRIVE,
GIVE F: AS YOUR SHARED DRIVE IN THE   COMMAND PROMPT

F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives
that you want to hack. “Myprint” is the name of remote computer’s
printer. These are displayed after giving “net use” command.
“219.64.55.112? is the IP address of remote computer that you want to
hack.

4. After succeeding your computer will give a message that “The command
completed successfully“. Once you get the above message you are only one
step away from hacking the computer.

Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with
the specified name. You can open it and access remote computer’s Hard-
Drive. You can copy files, music, folders etc. from victim’s hard-drive.
You can delete/modify data on victim’s hard-drive only if WRITE-ACCESS is
enabled on victim’s system. You can access files/folders quickly through
“Command Prompt”.

								
To top