1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Netbios

Discussion in 'Ethical hacking' started by cerebrum, Dec 15, 2008.

  1. cerebrum

    cerebrum New Member

    Joined:
    Dec 15, 2008
    Messages:
    36
    Likes Received:
    1
    Trophy Points:
    0
    While discovering open NETBIOS ports i.e 445 through Angry IP scanner, I was able to view the open shares but the system which were password protected sometimes prompted for password exposing their username and sometimes both the passsword and username fields were blank as if expecting me to provide both the usrname and pwd. Wats the difference ??
     
  2. neo_vi

    neo_vi New Member

    Joined:
    Feb 1, 2008
    Messages:
    722
    Likes Received:
    15
    Trophy Points:
    0
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    there is no much difference. But now a days netbios attack won't work much cos all the firewalls will block it. U can see the shared files using the net command. But u cannot do anything more than tat.
     
  3. cerebrum

    cerebrum New Member

    Joined:
    Dec 15, 2008
    Messages:
    36
    Likes Received:
    1
    Trophy Points:
    0
    there are many idiots still living on this earth who think that their data is safe until tampered locally !
    I have found many shares ( unprotected ) !! for GUI I use Angry IP scanner.
     
  4. growingboy

    growingboy New Member

    Joined:
    Dec 1, 2008
    Messages:
    26
    Likes Received:
    0
    Trophy Points:
    0
    how to find whether the share is protected or not.
     
  5. cerebrum

    cerebrum New Member

    Joined:
    Dec 15, 2008
    Messages:
    36
    Likes Received:
    1
    Trophy Points:
    0
    when you try to connect to the share it asks for the password .:nice:
    hence it is protectd !
     
  6. XXxxImmortalxxXX

    XXxxImmortalxxXX New Member

    Joined:
    Jun 27, 2007
    Messages:
    569
    Likes Received:
    18
    Trophy Points:
    0
    Seeing that its protected

    do a banner scan on the ip

    then find out what hes using since ur gaining somewhat access to him find a exploit for the users pc then upload it

    or go into backtrack 3 linux and type this


    Code:
    ./fast-track.py -i 4 127.0.0.1
    
    127.0.0.1 being his ip

    then it will do over a 100000 exploits on the users pc and give u a list of all u can do to access his computer


    hope it helps :)
     

Share This Page