The Visual, Step by Step netbios hack |
http://neworder.box.sk/iceberg_slim
Written by:iceberg_slim
|
This tutorial is intended for novice or intermediate
computer users looking to exploit Microsoft printer and file
sharing, also known as netbios (network basic input/output system).
This tutorial will cover the steps in exploiting netbios if your
using windows 9x or windows 2000/XP. To keep the interest of the
reader and dumb people who cant understand text, screen shots will
also be shown for every step in the procedure. Each step will show
procedures in windows 9x and windows 2000. The assumption that you
know basic DOS commands and the function of IP addresses and file
sharing is recommended. You will not need any extra tools, they are
all provided with a default windows installation. If you want to enable your file & printing sharing..Go to my computer,Control panel then open the network section.then click on the file and printing button...
Steps 1. Check if IP or host has netbios
enabled 2. Input IP and relating sharename into HOSTS file
3. Find computer 4. If share is password protected, use
resources to get around protection. 5. 0wn the b0x!
1. Before even trying anything with netbios, you
must have netbios enabled and you must have file sharing enabled.
First we must determine if the remote computer has netbios enabled,
because without netbios being enabled on your computer and the
remote computer, none of the following will be able to happen. To
check the remote computers netbios status, DOS has a utility just
for that, NBTSTAT.EXE
In win9x/ME, it's located at \windows
In windows 2000/XP, it's located at \winnt\system32
Nbtstat is run from the DOS prompt only, just open a DOS
prompt and type in "nbtstat", no quotes, but to find out if the
remote computer is exploitable and if we can access it, we use a
certain nbtstat command, "nbtstat -A ip address",no quotes.
If the command returns an output of "host not found",
either the remote computer does not have file sharing enabled or the
host is not responding to that command. But if the command returns a
list, then the command was successful and netbios is enabled.
success here
The listing you now get might be confusing but
we are only really looking for a certain thing here. The <20>
shows that the remote computer has file sharing enabled among other
things. Other services listed might be the messenger service and the
name of the currently logged on user. The name in front of the
<20> is the sharename; this is basically what is needed to now
gain access to the computer.
2. Now that we have the IP
and the sharename of the computer, we can now move on to putting
those into the HOSTS file. The HOSTS file is a file that windows
looks at when it does any network translations from IP to netbios
name and vice versa. Windows will always look at the HOSTS file
before it looks any where else to translate, if windows finds the IP
and netbios name its looking for, it doesn't go searching anywhere
else like a central server. The HOSTS file has no file extension in
windows; its simply just called "HOSTS".
in 9x/ME, its
located at \WINDOWS in 2000/XP, its located at
\WINDOWS\system32\drivers\etc
Don't freak out if its not
found because on a default installation of windows, there is no
HOSTS file, you have to make one. It's very easy, just browse to the
directory of where its supposed to be located and right click and go
to new > text document, save it in the directory as "HOSTS", no
quotes, now you have a HOSTS file. Make sure the file does not have
a ".txt" extension, remember that the file just needs to be named
"HOSTS". Windows may ask you to confirm that you want to have the
file with no extension, this is ok and correct. Now go back and get
the IP and sharename you just found, insert the IP first and then a
space and insert the sharename. as shown here in this screenshot.
After the IP and sharename are in the HOSTS file, click file
> save. Now it's time to see if we can actually get in.
3. On win9x/me systems go to start > search > find
computer. On windows 2000 its the same, but for XP you go to start
> search > file or folders, then click the label on the left
hand side called "computers or people". Enter the IP of the remote
computer and search for it, it should show up on the list and you
double click the computer to access its shares. Shown here.
If a box pops up and asks for a password, then you can use a
program called pqwack to brute force the password, it may take time
to break the password. But mostly you will not encounter a password
box; I personally have only encountered 1 out of dozens. Now you can
browse freely the shared hard drive or share. When browsing, it's
very slow, because of latency and windows has a flaw with task
schedule it slows down network browsing when using netbios, task
schedule checks the remote computer for any tasks at hand. Just let
windows explorer take the information off of the remote computer, it
may take time, but it's very easy now to see what's on the remote
computer. On some windows 2000 and windows NT systems, certain
directories are not accessible due to restrictions to browsing local
directories, you may try to open the windows directory and get a box
saying that the directory is off limits and due to administrator
restrictions you cannot open the directory.
the
ENTIRE C drive is shared to the internet!
So now
you have pretty much owned the box and can do anything. Deltree it
and see if I care. Peace.
Iceberg Slim does not condone nor
endorse malicious intent derived from this material. User discretion
is advised.
Salutations = everyone and anyone @
www.fromadia.com , drew, bakesnake, the big bad tunafish, squire
James (Just cause he propped me in his writing), sc00by_f00, aj,
stroker, ETC ETC, too long to list.
|