HOW TO HACK INTO SOMEONES COMPUTER ON LAN NETWORK?


-------------- Hacking into a computer ----------

This tutorial is for readers as well who have only the basic knowledge, they will also be able to understand how hackers
hack with NetBIOS. Using NetBIOS is probably the easies way to hack into a computer.

WHAT IS NetBIOS?

NetBIOS stands for Network Basic Input Output System. It allows applications on separate computers to communicate over a
local area network. NetBIOS was developed in 1983 by Sytek Inc, as an API for software communication over IBM's
PC-Network LAN technology. As many other service it also works on a port (port 139).Most people don’t even know
 but when they are connected to the internet they could have their hard drive shared. So if we can find a way into
the network than we can do anything with the computer.

LETS BEGIN

1. You need to download cain and abel. It’s a really useful program.
(YOU CAN EASLY DOWNLOAD www.softpedia.com)

Once you got it open it. It has a sniffer built inside of it. An IP sniffer looks for every ip address in your local
 subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the
 blue cross. Another window will pop up, make sure “All host in my subnet” is selected, and then click ok. It will scan
 for computers printers etc. Now choose an Ip address that you would like to hack.

When you got your target go to start ->run and type “cmd” without quotes. This will open the command prompt which
we will be using for the whole tutorial.

2. If you don’t know if your target is turned on then you can check it with the ping command, just type:ping IP
 address into the command prompt.
C:\Users\xxxxx>ping 192.168.1.11
Pinging : bytes=32 time<1ms TTL=128Reply from : bytes=32 time<1ms TTL=128Reply from : bytes=32 time<1ms TTL=128Reply
from : bytes=32 time<1ms TTL=128:Packets: Sent = 4, Received = 4, Lost = 0 (0% losApproximate round trip times in
 milli-seconds:Minimu­m = 0ms, Maximum = 0ms, Average = 0ms
NetBIOS Remote Machine Name Table
Share name Type Used as Comment\CIf the command was successful than we will get the confirmation - The command was
 completed successfully.\ipc$ "" /­user:""You may replace k letter by any other letter. If you did everything correctly
 than by now you should have a drive named K:. You should be able to do anything to the computer’s C drive including
 hacking the hell out of it, or putting a key-logger on the drive.. ENJOY.....:)