Hack Into A Computer Using Netbios Hacking



Netbios Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

In this post i will tell you to hack into a computer with netbios hacking .Netbios hacking is the easiest way to Hack into a remote computer.


Procedure for Netbios hacking

So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross


Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.



It should begin to scan.

Then IP’s, computer names, and mac addresses will show up. Now remember the IP address of the computer you are going to be breaking into. If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok. During the next step we will begin our trial and error.



Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN. If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on. Click on the start menu and go to run, type in cmd, and click ok. This should bring up the command prompt. From here we will do most of the hacking. Now I will be referring to certain commands that need to be inputted into the command prompt. I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt. I am only doing this to avoid confusion. Let’s get back to the hacking. Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.” This will tell us if the target is online. If it worked, it will look something like this (note, I have colored out private information):


IF it didn’t work, meaning that the target is not online, it will look something like this:

If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.

 STEP 2 - Hacking into a computer
--------------------------------------------------------------------------------------------------

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.” This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.




Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.

The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.

The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.


The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup


Step 3  - Hacking into a computer
---------------------------------------------------------------------------------------------

Finally it’s time. By now we know: that our target is online, our target has file sharing, and our target’s computer name. So it’s time to break in. We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\192.168.1.103”



We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.

All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.


As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks. If it worked, it will say “The command completed successfully.” If not, you will have to go retrace you steps. Now open up “my computer” under the start menu, and your newly created network drive should be there.




Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive. The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network. So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer, because you never know if the target changes the sharing setting. If you are just doing this to hack something, then go explore it and have some well deserved fun!


Congratulations! You’ have hacked into the victims computer
But, before you leave, please look over some of this information for further help and just for thanks to me.

Commands used in this tutorial:

PING
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)

Subscribe to our Newsletter and receive updates directly via email - Get Ethical hacking and security tips directly to your inbox. Alternatively you can Join our Hackers Community on Facebook , Google+ and Twitter .

At RHA Infosec we provide different types of Security Testing from small business sites to Corporate Sites. Click Here to know more about our complete list of services.

Subscribe to RHA


Enjoyed this article?
Subscribe to "Rafay Hacking Articles" and get daily updates in your inbox for free!


Tags:


Kindly Bookmark it and Share it with Friends:

81 comments :

  1. Hi. your contact form doesnt seem to be working. is there any other way to contact you?
    Ezzk

    ReplyDelete
  2. @Anarchia3lites
    I have fixed it now.Thanks for informing

    ReplyDelete
  3. Hi there,

    That was really cool - thanks for this.
    I only knew about ping.
    Now I know three more DOS very useful commands.

    But i think in order to map the drive we would require 2 things(please correct if wrong)
    1) The target must not only have the file sharing and printing enabled on the connection used. (this could be so by default)
    2) But also configure the drive to be available for shared use. (Drive properties - Sharing tab)
    Drive properties are not configured to be shared in windows by default.
    I wonder if an average home user target could be a victim to this method ??

    But again - cool stuff for your own remote use.
    Please advise if you know of a work around of the above two points or if they are not an obstacle at all.

    Thanks

    ReplyDelete
  4. sir whats Cain and Abel ?????

    ReplyDelete
  5. Hey there is a problem while using dis trick...

    Whenever i used "net view \\(Ip adress)" it shows that "syntax error 5... Access denied".... what to do with this???

    Plzzzzz help me!!!!!!!!

    ReplyDelete
  6. @Ultimate Gamer
    If it is written "access denied" so the victims firewall is blocking the attack

    ReplyDelete
  7. thanx for replying but can u suggest a way to close the victim's firewall????????? plz help!

    ReplyDelete
  8. Open up Cain and how to open sir

    ReplyDelete
  9. @Anonymous
    What problem are you facing i cant understand?

    ReplyDelete
  10. Hey Rafay, when i type the command "nbtstat -A , it tell me "host not found"!!!! Can you tell me what to do please!!!

    ReplyDelete
  11. can i hack into the victim's computer by netbios even if the victims computer port 139 is not open????

    ReplyDelete
  12. Hey Can you paste me the link of this program i'm having a hard time finding it ://// PS: Love your Work!

    ReplyDelete
  13. I just see only shared files on other PC.Is this hacking??? Is there are way to hack WAN/LAN ? :/ Please answer..

    ReplyDelete
  14. u can hack an ip address if it's 139 port is open,,,there remain many services opened on an ip on a ports....we just need to scan....after tht we can go in system by exploiting it........if u want to learn exploiting.....add me....amrit_pal500@yahoo.com.........very nice tutorials....rafay...can i got ur id to add u......

    ReplyDelete
  15. how to shut the firewall sir to prevent syntax error plz tell

    ReplyDelete
  16. Hi can you tell me if with Cain and Abel there is anyway to view the passwords someone using my wireless network is using for gmail ,facebook etc .Thanks

    ReplyDelete
  17. It asks for user name and password int the end...how to find them ??????

    ReplyDelete
  18. Firstly its a cool tutorial dear,
    And is there any way to hack the unshared data.
    If yes will you explain it.
    Thnx in regards.

    ReplyDelete
  19. Firstly heartfull tnnx for this good tutorial,
    Will u tell me how to hack even unshared data once we locate the computer we want to hack using commands

    ReplyDelete
  20. You can Simply do this using netscan software it will scan all computers in network and shows a plus sign beside those computers who have Shared Drive just click it and have fun

    ReplyDelete
  21. those ip addresses look like u are in the same network as the other computers!!

    I dont think its this easy to hack into computers outside of ur network!

    ReplyDelete
  22. while using net view command it shows "THERE ARE NO ENTRIES IN THE LIST" what does it mean & how can it be solved??

    ReplyDelete
  23. @Anonymous
    Switch to another target, File and printer sharing is disabled on the target PC

    ReplyDelete
  24. hii this is jenson
    this trick worked for me but the problem is that when i mapped the drive i saw my own shared c dive and not his please help

    ReplyDelete
  25. what is a netbios password.

    ReplyDelete
  26. woooooooooooooooaaaah!! Good job! Thx for all!!

    ReplyDelete
  27. i want to break a site password. i know its user name, how can i do that. kindly do infrom me at nazia.shiekh@yahoo.com

    ReplyDelete
  28. what r the softwares u used >?????

    ReplyDelete
  29. where can i get netbios hacking tool for free?
    can anyone give me the link???

    ReplyDelete
  30. hollo bro y ned a code to kill my victims firewall .. it is ther somthing like that that i can do it remotly

    ReplyDelete
  31. it dose not stop, continously scaning MAC addresses

    ReplyDelete
  32. WELL I CANT OPEN NBTSTANTS x( I PRESS RUN>NBTSTATS AND WINDOW SHOWS IN 1 MILISECOND AND THEN GONE,WHAT TO DO?

    ReplyDelete
  33. i have now the ip add of the bank to be hacked in..how can i go directly to its data base? hehe

    ReplyDelete
  34. Wish it was all that easy as I would love the registered user data file from a website run by criminals has defrauded thousands from unsuspecting people.

    ReplyDelete
  35. where is download this Software. (net bios) plz help me

    ReplyDelete
  36. how to reconnect to the target after disconnecting ?

    ReplyDelete
  37. Ok please someone help... How can i connect to his specific computer if he has a router and doesent have same ip as me?>

    ReplyDelete
  38. Error 53 is coming when I use Net View, please advice

    ReplyDelete
  39. Hello

    nice tutorial. Still; I missi a basic point, do you need to be on the same WAN/LAN to be able to target a machine?
    Thanks
    mmm

    ReplyDelete
  40. kindly tell Me the commands To shut these Drive off ,after You have Done Your hacking of drives...how to shut down the drives

    ReplyDelete
  41. the dialog box from the blue cross is working, I mean that when the test cannot commence and the range is error or something like that... please fill me in

    ReplyDelete
  42. i want to hack wireless network anybody know how to hack it?
    it is possible with this software?

    ReplyDelete
  43. i want to hack wireless network anybody know about it?
    it is possible with this software? pls tell me.

    ReplyDelete
  44. brother say the program name with download link please

    ReplyDelete
  45. Just google for Cain and Abel Windows download link.

    ReplyDelete
  46. Bro, i need your help. Recently an IT personnel had came to our office and blocked all the internet access from the Server itself, by only limiting us to view only the company website. I've somehow got the Ip Address of the server. They're using D-link type Fast Ethernet Switch. I need to get into their settings from an open web source using 192.168.0.1, but it's aksing for Username and password. The defaults have been tried, but no avail. I need to sniff out their password and username. Is it possible for you to help.

    ReplyDelete
  47. Do you live off of lies? Or do you thrive on truth? Find out here!
    kadobi@hotmail.fr

    ReplyDelete
  48. hey i have tried 'nbtstat' and net view now when i go to 'net use' it is giving me 'system error 67 has occurred'. What could be the problem? and if at there is a way to disable remote firewall?

    ReplyDelete
  49. hei..do u have any idea to hack to a computer or to get into a computer in a different network in someother place which is far away from my computer???i am using a mac book ios x..
    thank u.

    ReplyDelete
  50. whenever i type net.......ex.net view or net use...and hit enter its says net is not recognized as an internal or external command,program or batch file......what to do help.....and reply

    ReplyDelete
  51. It's a lot easier to just use the normal Windows Network display and select a PC and drive from the GUI. This isn't hacking, it's really just telling you how to use nbtstat ....

    ReplyDelete
  52. Well, I didn't want to cause any trouble, so I did it to my own computer put when I i do those last 2 commands, well, the next to last want giv me the hard drive name, and the last I type in the command a =nd ecvery thing like you said to do, but it says somthing about an error...

    Whats goin on?

    ReplyDelete
  53. hi rafay it is too old and the percent to access is 1%
    hac_@live.com

    ReplyDelete
  54. Hehehe now I can view everything the user has put in the shared folder like a folder with pics in it... Im such an awesome hacker >>> JUNK <<<

    ReplyDelete
  55. Hey there is a problem while using dis trick...

    Whenever i used "net view \\(Ip adress)" it shows that "system error 5 has occurred ".... what to do with this???

    Plzzzzz help me!!!!!!!!

    ReplyDelete
  56. Hey there is a problem while using dis trick...

    Whenever i used "net view \\(Ip adress)" it shows that "system error 5 has occurred ".... what to do with this???

    Plzzzzz help me!!!!!!!!

    ReplyDelete
  57. Guys i got a problem it never ends the scan...
    what is hapenning?????????????????

    plz help me

    ReplyDelete
  58. hey what we can do with the pc of people sitting on the internet if we have there externel ip address

    ReplyDelete
  59. is it possible without knowing network computer password???????

    ReplyDelete
  60. This ip hack my com 109.237.33.252
    Please how i cant hack this ip

    ReplyDelete
  61. follow the link below that tell firewall enable/disable tips through command prompt

    http://helpdeskgeek.com/networking/windows-firewall-command-prompt-netsh/

    ReplyDelete
  62. everyone wanna hack everyone

    , i creat a simple software programe is a touche from exploit and bios +
    networking i call it CORDOBA !. if somebody wana know more about it contact me kadobi@hotmail.fr

    ReplyDelete
  63. Nice 3 1/2 floppy disk drive.

    ReplyDelete
  64. When I use this command: "nbtstat -a IPaddress" it shows "Host not found...What to do?

    ReplyDelete
  65. hi,when i type net use k: \\(victim's ip address)\(sharedDocs),why it need username and password of (victim's ip address)?have any solution can share with me?thanks~

    ReplyDelete
  66. I also facing same this problem please anybody help all of us.

    ((( hi,when i type net use k: \\(victim's ip address)\(sharedDocs),why it need username and password of (victim's ip address)?have any solution can share with me?thanks~ )))

    ReplyDelete
  67. Where the hell is the download

    ReplyDelete
  68. Can someone help me hack into a computer ? want to delete some files about me. I know the IP address, someone plse help - sherry993@rediffmail.com

    ReplyDelete
  69. Noobs,

    Noobs everywhere. . .

    ReplyDelete
  70. A.O.A.Thanks But If you could tell a way how to bypass the firewall security.

    ReplyDelete
  71. system error 5 has occured
    access denied.

    bro how can i disable firewall of a pc?

    ReplyDelete
  72. yo same question as "Anonymous 10"
    i would type in "nbtstat -a (ip adress)and results......HOST NOT FOUND. what do i do??? + i tried "nbtstat -A (ip adress) it would give me all the info abot the s's and a's function!!
    PLEASE HELP MOI

    ReplyDelete
  73. This is not a hack! You just use windows share function! Hack is when you access password protected data!

    ReplyDelete
  74. WHEN WE USE NET VIEW \\(IP ADDRESS) , IT SAYS, "SYSTEM ERROR 5 HAS OCCURED" ,, WHAT DOES IT MEAN??

    ReplyDelete
  75. Does this work with smartphones aswell ?

    ReplyDelete
  76. at the last when i open the disk which i hacked was my disk
    help me..............

    ReplyDelete
  77. hello sir this post was very use ful but system error 5 has occur how can i gain acess?

    ReplyDelete
  78. Sir, how could I know that my pc is hacked. Sometimes I find my browsers closes for seconds automatically while chatting with friend and resumed automatically to where i was. Is there any awy check if my pc was hacked or not. Please help me..........

    ReplyDelete
  79. You used proxies then your data and information is been secure therefor hacker cannot hack your system or data your all personal data is secureHidemyass Proxy

    ReplyDelete
  80. Ans:use mega ping and its net bios scanner for scan.
    Q: Messge shows access denied,,,,,......How to solve???.........reply me plz.

    ReplyDelete

Blog Archive

 

Recent Comments

About

Rafay Baloch is an Independent security researcher, Internet marketer, Entrepreneur and a SEO consultant, He is the founder of RHA blog and multiple other blogs. Rafay got famous after finding a Remote Code Execution bug inside PayPal for which PayPal awarded him a sum of 10,000$ Read More..

Join In!

RHA © 2013. All Rights Reserved.