1. We have moved from vBulletin to XenForo and you are viewing the site in the middle of the move. Though the functional aspect of everything is working fine, we are still working on other changes including the new design on Xenforo.
    Dismiss Notice


Discussion in 'Ethical hacking' started by cerebrum, Dec 15, 2008.

  1. cerebrum

    cerebrum New Member

    While discovering open NETBIOS ports i.e 445 through Angry IP scanner, I was able to view the open shares but the system which were password protected sometimes prompted for password exposing their username and sometimes both the passsword and username fields were blank as if expecting me to provide both the usrname and pwd. Wats the difference ??
  2. neo_vi

    neo_vi New Member

    there is no much difference. But now a days netbios attack won't work much cos all the firewalls will block it. U can see the shared files using the net command. But u cannot do anything more than tat.
  3. cerebrum

    cerebrum New Member

    there are many idiots still living on this earth who think that their data is safe until tampered locally !
    I have found many shares ( unprotected ) !! for GUI I use Angry IP scanner.
  4. growingboy

    growingboy New Member

    how to find whether the share is protected or not.
  5. cerebrum

    cerebrum New Member

    when you try to connect to the share it asks for the password .:nice:
    hence it is protectd !
  6. XXxxImmortalxxXX

    XXxxImmortalxxXX New Member

    Seeing that its protected

    do a banner scan on the ip

    then find out what hes using since ur gaining somewhat access to him find a exploit for the users pc then upload it

    or go into backtrack 3 linux and type this

    ./fast-track.py -i 4 being his ip

    then it will do over a 100000 exploits on the users pc and give u a list of all u can do to access his computer

    hope it helps :)

Share This Page