Netbios

Discussion in 'Ethical hacking' started by cerebrum, Dec 15, 2008.

  1. cerebrum

    cerebrum New Member

    Joined:
    Dec 15, 2008
    Messages:
    36
    Likes Received:
    1
    Trophy Points:
    0
    While discovering open NETBIOS ports i.e 445 through Angry IP scanner, I was able to view the open shares but the system which were password protected sometimes prompted for password exposing their username and sometimes both the passsword and username fields were blank as if expecting me to provide both the usrname and pwd. Wats the difference ??
     
  2. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    there is no much difference. But now a days netbios attack won't work much cos all the firewalls will block it. U can see the shared files using the net command. But u cannot do anything more than tat.
     
  3. cerebrum

    cerebrum New Member

    Joined:
    Dec 15, 2008
    Messages:
    36
    Likes Received:
    1
    Trophy Points:
    0
    there are many idiots still living on this earth who think that their data is safe until tampered locally !
    I have found many shares ( unprotected ) !! for GUI I use Angry IP scanner.
     
  4. growingboy

    growingboy New Member

    Joined:
    Dec 1, 2008
    Messages:
    26
    Likes Received:
    0
    Trophy Points:
    0
    how to find whether the share is protected or not.
     
  5. cerebrum

    cerebrum New Member

    Joined:
    Dec 15, 2008
    Messages:
    36
    Likes Received:
    1
    Trophy Points:
    0
    when you try to connect to the share it asks for the password .:nice:
    hence it is protectd !
     
  6. XXxxImmortalxxXX

    XXxxImmortalxxXX New Member

    Joined:
    Jun 27, 2007
    Messages:
    561
    Likes Received:
    19
    Trophy Points:
    0
    Seeing that its protected

    do a banner scan on the ip

    then find out what hes using since ur gaining somewhat access to him find a exploit for the users pc then upload it

    or go into backtrack 3 linux and type this


    Code:
    ./fast-track.py -i 4 127.0.0.1
    
    127.0.0.1 being his ip

    then it will do over a 100000 exploits on the users pc and give u a list of all u can do to access his computer


    hope it helps :)
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice