Monday, June 18, 2012

NETBIOS HACKING Part2

Netbios Hacking Part2.
The first step is to identify a target computer. Click here!


Step2. Trial and Error


Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN (refer to the previous post to get more info about LAN and WAN). If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on. Click on the start menu and go to run, type in cmd, and click ok. This should bring up the command prompt. From here we will do most of the hacking. Now I will be referring to certain commands that need to be inputted into the command prompt. I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt. I am only doing this to avoid confusion. Let’s get back to the hacking. Type in “ping (IP address of the target).” 


For example in this tutorial, “ping 192.168.1.103.” This will tell us if the target is online. If it worked, it will look something like this (note, I have colored out private information):




IF it didn’t work, meaning that the target is not online, it will look something like this:




If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.


At this stage it's getting very interesting. The next step is to "Gather information". Information is the key! 

NETBIOS HACKING Part1

NetBIOSHacking

For this tutorial, I used Microsoft’s Windows XP Home Edition OS.

-What is it?
NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

-How can this be of use to me?
Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

-What do I need?
Windows OS
Cain and Abel >>>Get it here: 
www.oxid.it/cain.html 

Step1: How to Find the Target?



So first of all, we need to find a computer to hack into. So if you are plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross

Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.





It should begin to scan.






Then IP’s, computer names, and mac addresses will show up. Now remember the IP address of the computer you are going to be breaking into. If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok. During the next step we will begin our trial and error.




Thanks for following us! I hope you've enjoyed it.

Success is a Process!: Hacking Websites

Success is a Process!: Hacking Websites: Hacking Websites There are many ways to hack a website . Some are more efficient, some are just useless. In this series, we are going to...

Hacking Websites


Hacking Websites


There are many ways to hack a website. Some are more efficient, some are just useless.
In this series, we are going to learn some tricks only for educational purpose. We believe that
when you start thinking the way an attacker thinks then you can find ways to escape from him.
Well, lets start the job!! Have fun.


If you posess the HTML & JAVA knowledge then you can even access password protected websites.


To hack a Password Protected Websites just follow these steps: -


* Open the website you want to hack. Provide wrong username-password.
(e.g : Username - me and Password - ' or 1=1 --)
An error occured saying wrong username-password. Now be prepared
ur work starts from here...


* Right click anywhere on that page =>> go to view source.


* There you can see the html codings with javascripts.


* There you find somewhat like this..




* Before this login information copy the url
of the site in which you are.(e.g : www. hack.com)




* Then delete the java script from the above that validates your
informaiton in the server.(Do this very carefully, your success to
hack the site depends upon this i.e how efficiently you delete the
Javascripts that validate ur account information)






then look for...code ..: input name="password" type="password"
=> replace
there instead of . See there if
maxlength of password is less than 11 then increase it to 11
(e.g : if then write


* Just go to file => save as and save it any where within
the hardisk with ext.html(e.g :c:hack.htm)


* Close your webpage and go to the webpage u save in your
harddisk(e.g : c:hack.htm) Open it.


* You see that some changes in current page as compared to original
One. Don't worry.


* Provide any username[e.g:hacker] and password[e.g:' or 1=1 --]


Congratulation!You have cracked the above website and entered into the
account of Ist user saved in the server's database.

Now you know how attackers can exploit HTML and JAVA. 
Thanks for reading us, please send us your comments.
Success is a Process!