Create an account

Very important

  • To access the important data of the forums, you must be active in each forum and especially in the leaks and database leaks section, send data and after sending the data and activity, data and important content will be opened and visible for you.
  • You will only see chat messages from people who are at or below your level.
  • More than 500,000 database leaks and millions of account leaks are waiting for you, so access and view with more activity.
  • Many important data are inactive and inaccessible for you, so open them with activity. (This will be done automatically)


Thread Rating:
  • 346 Vote(s) - 3.44 Average
  • 1
  • 2
  • 3
  • 4
  • 5
hacking port 139

#1
1. What is your NetBIOS.

2. NetBIOS in Windows.

3. Finding the weak point.

4. Exploitation of weakness.

5. As you pass the password.

6. How can you determine the operating system share option to activate all its partitions.

____________________________________________________________________________________________________________________________



1. NetBIOS (Network Basic Input / Output System) is an operational concept developed by IBM and Sytek designed to fulfill the role of API (Application

Programming Interface) for an application can access network resources. In short NetBIOS allows applications to communicate with a network.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~

2. NetBIOS in Windows. A computer can be accessed if the NetBIOS port 139 is open. This port (139) is the most dangerous port on the Internet. All files and printers who started the share option on a Windows system running on this port. Approximately 10% of all Internet users were exposed to hard drives through this port. This port (139) is the first port that wants to connect to a hacker and all this port is blocked by a firewall.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~

3. Finding the weak point. To find a vulnerable computer must scan a network or a range of IP addresses to see which has port 139 open. For this I recommend using IPScan program . Once the scan is complete and there are vulnerable IPs go to Section 4.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~

4. Exploitation of weakness. After choosing vulnerable IP connection is passed from it as follows:

START> RUN> RUN In the box enter the command \ \ xxx.xxx.xxx.xxx then click OK.

ATTENTION xxx.xxx.xxx.xxx is the IP I found so replace x's with the IP found

If everything went well you should open a window with the contents of the victim's hard disk. Now you can see, create download or upload or even delete files on the victim's computer.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~

5. As you pass the password. It may sometimes happen that the computer tries to connect to be protected by a password. In this case you should use PQwak program . In this program you just need to enter IP and share name. The share name is the name of the folder that is password protected. After introducing these things just to watch how it works PQwak.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~

6. How can you determine the operating system share option to activate all its partitions. If the partition that has enabled the option to share is (C: \ D: \ etc..) Where you can put a Trojan which can give access to the rest of the partitions and even entire computer. To do this you must create a file will be named autorun.inf file To do this you must create a text file that contains the following:

-------------------------------------------------- -------------------------------------------------- -------------------------------------------------- ----------------

BE WRITTEN BELOW THE COPY WITHOUT CHANGES.

-------------------------------------------------- -------------------------------------------------- -------------------------------------------------- ----------------

[Autorun]

open = autoexec.bak.exe

-------------------------------------------------- -------------------------------------------------- -------------------------------------------------- ----------------

Then save the file to be modified is the extension of txt. Txt to. Inf

Then with a Trojan is made a trojan called autoexec.bak.exe

Now the two files are ready when you need to copy the main folder in the root meaning. For example if we have access to the partition C: \ where our files will be copied directly on a partition without being put in the folder.

Now you just need to wait for the victim to access the partition where you put those two files. Once opened it will run the trojan partition providing access to every computer.
Reply

#2
Wow awesome :smile:

This deserves rep!!!

Maby you could also include some programs like ÏP scanners or so :smile: Some that you like
Reply

#3
I will add today the programs ..
I'm kind'of busy right now but I will add them in a few hours
Reply

#4
Quote:(04-05-2011, 07:38 AM)Shadwow Wrote:

[To see links please register here]

I will add today the programs ..
I'm kind'of busy right now but I will add them in a few hours :biggrin:

its fine :smile: it was just a suggestion
Reply

#5
right :p anyway ... glad u like it :p
Reply

#6
This is an old tutorial :smile: But still great work if you wrote it!
Reply

#7
Quote:(04-05-2011, 10:48 AM)Vista1337 Wrote:

[To see links please register here]

This is an old tutorial :smile: But still great work if you wrote it!

I can hack port 445 with firewall on and disable it.
I can also hack any computer with printer sharing on with the firewall on and make his computer talk to him and I'm not lying dead serous if you want a tutorial I'll make but it will be long and need to exceed my limit of 20 pics a post and I would have to get some reps if you don't mind because it's a lot of typing and work.

So let me know I'm ready when you guys are.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

©0Day  2016 - 2023 | All Rights Reserved.  Made with    for the community. Connected through