Hack Into A Computer Remotely | NetBIOS Command
In this post I will show you how to hack into computers connected into LAN using NETBIOS.
NetBIOS is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol. In modern networks, NetBIOS normally runs over TCP/IP via the NetBIOS over TCP/IP (NBT) protocol. It is a way for LAN or WAN to share folders, files, drives and printers.
Netbios is one of the easiest way to hack into remote computers. In this tutorial we are going to use a windows based operating system like windows XP, Vista, 7 or 8.
So without wasting any more time let's start with the tutorial. Follow the steps......
So without wasting any more time let's start with the tutorial. Follow the steps......
PROCEDURE :
So first we need to find computer connected in our LAN. In this tutorial we are going to exploit those systems which have shared folders or drives in a network.
To find our target we will use a small but very useful program "NETCUT". You may have heard of it even used it. Run "NETCUT" as Administrator or else it may not work as we wanted.
This has a built in sniffer which sniffs the ip address of all the machines which are connected in the LAN. See in above pictures.
Select your target from the result that you see in your NETCUT screen. Now as you have selected your target follow the steps below.
Step 1 :
Open command prompt in your windows system. Click on start menu and go to run, type in cmd and click ok. this will bring up the command prompt.
Step 2 :
In the command prompt type in " ping (ip address of the target)" and hit enter. This we are doing to check whether we are connected to our target or not.
For example : ping 192.168.2.26
This will tell us whether our target is online or not. If you get response as above i.e you get a reply from the target, it means the target is online. If you don't get a response from the target means the target is not live. If the target is not online then we cannot proceed. So either you select new target or wait for the target to come online.
Step 3 :
Now in the command type : nbtstat -a (target's ip address). Hit enter and observe the command window response. This command will show whether file sharing is enabled on the target system. If the file sharing is enabled it will show us the currently logged user, workgroup and the computer name. See the image below.
In the above window in the first row after the name column you can see <20>. It means that the file sharing is enabled on Shree420. If there is no <20> that means file sharing is not enabled and we have to choose another target.
Step 4 :
Now after the above step we know that our target is online and also file sharing is enabled on the target system and is ready to be exploited. So it's time to break in. We have to now locate shared files and folders on the target. For this type in the below command in command prompt and hit enter.
"net view \\ (target's ip address)"
For example : net view \\ 192.168.2.26
Now as you can see in the above terminal you can see "Users" is shared and under the type its shows "Disk". this means we can access his disk and all the data. So all's that is left to do is "map" map the shared drive onto our computer. To do this we will make a drive on our computer and all the content of the target's computer can be accessed through our network drive.
Step 5 :
Now the final step type in the terminal command type the following and hit enter key.
"net use K: \\ (target's ip address)\(shared drive or folder's name from previous step)
for example : net use K: \\192.168.2.26\Users
In the above command you can see I used letter "K" but it is not mandatory to use K. You can use any letter until it has been used to denote some drive or network devices on your system.
Now to see the contents of the target system open "My Computer" and there you will see the drive that you have recently mapped on you system.
See the image below :
So now we have successfully completed our hack using NETBIOS command in windows. This hack works on all version of windows. I performed this on Windows 8.1 and it works perfectly. Also don't worry about getting caught because the target will not be aware of any kind of activity on his/her system.
Note : If you will disconnect from the internet the files in the mapped drive will not be accessible any more. So don't forget to save the files onto your hard drive some safe place.
If you want to be safeguard yourself from this attack please try not to share anything on a public network. If it is necessary to use the sharing feature then after the share is completed turn off the sharing.
Keep visiting for more cool hacking tutorial and avoid yourself getting hacked. If you have any questions or doubts please comment below.
Also please do remember to like us on FACEBOOK. Thank You