Pin It

Hack Into A Computer Using Netbios Hacking



Netbios Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

In this post i will tell you to hack into a computer with netbios hacking .Netbios hacking is the easiest way to Hack into a remote computer.


Procedure for Netbios hacking

So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross


Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.



It should begin to scan.

Then IP’s, computer names, and mac addresses will show up. Now remember the IP address of the computer you are going to be breaking into. If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok. During the next step we will begin our trial and error.



Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN. If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on. Click on the start menu and go to run, type in cmd, and click ok. This should bring up the command prompt. From here we will do most of the hacking. Now I will be referring to certain commands that need to be inputted into the command prompt. I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt. I am only doing this to avoid confusion. Let’s get back to the hacking. Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.” This will tell us if the target is online. If it worked, it will look something like this (note, I have colored out private information):


IF it didn’t work, meaning that the target is not online, it will look something like this:

If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.

 STEP 2 - Hacking into a computer
--------------------------------------------------------------------------------------------------

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.” This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.




Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.

The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.

The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.


The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup


Step 3  - Hacking into a computer
---------------------------------------------------------------------------------------------

Finally it’s time. By now we know: that our target is online, our target has file sharing, and our target’s computer name. So it’s time to break in. We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\192.168.1.103”



We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.

All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.


As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks. If it worked, it will say “The command completed successfully.” If not, you will have to go retrace you steps. Now open up “my computer” under the start menu, and your newly created network drive should be there.




Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive. The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network. So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer, because you never know if the target changes the sharing setting. If you are just doing this to hack something, then go explore it and have some well deserved fun!


Congratulations! You’ have hacked into the victims computer
But, before you leave, please look over some of this information for further help and just for thanks to me.

Commands used in this tutorial:

PING
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)

Subscribe to our Newsletter and receive updates directly via email - Get Ethical hacking and security tips directly to your inbox. Alternatively you can Join our Hackers Community on Facebook , Google+ and Twitter .

At RHA Infosec we provide different types of Security Testing from small business sites to Corporate Sites. Click Here to know more about our complete list of services.

Subscribe to RHA


Enjoyed this article?
Subscribe to "Rafay Hacking Articles" and get daily updates in your inbox for free!


Tags:


Kindly Bookmark it and Share it with Friends:

80 comments :

anarchia3lites on November 11, 2009 at 11:36 AM said...

Hi. your contact form doesnt seem to be working. is there any other way to contact you?
Ezzk

Rafay Baloch on November 16, 2009 at 10:24 AM said...

@Anarchia3lites
I have fixed it now.Thanks for informing

Anonymous said...

Hi there,

That was really cool - thanks for this.
I only knew about ping.
Now I know three more DOS very useful commands.

But i think in order to map the drive we would require 2 things(please correct if wrong)
1) The target must not only have the file sharing and printing enabled on the connection used. (this could be so by default)
2) But also configure the drive to be available for shared use. (Drive properties - Sharing tab)
Drive properties are not configured to be shared in windows by default.
I wonder if an average home user target could be a victim to this method ??

But again - cool stuff for your own remote use.
Please advise if you know of a work around of the above two points or if they are not an obstacle at all.

Thanks

Anonymous said...

sir whats Cain and Abel ?????

ultimate gamer on April 2, 2010 at 6:05 AM said...

Hey there is a problem while using dis trick...

Whenever i used "net view \\(Ip adress)" it shows that "syntax error 5... Access denied".... what to do with this???

Plzzzzz help me!!!!!!!!

Rafay Baloch on April 2, 2010 at 11:55 PM said...

@Ultimate Gamer
If it is written "access denied" so the victims firewall is blocking the attack

ultimate gamer on April 17, 2010 at 8:31 PM said...

thanx for replying but can u suggest a way to close the victim's firewall????????? plz help!

Anonymous said...

Open up Cain and how to open sir

Rafay Baloch on May 25, 2010 at 6:47 AM said...

@Anonymous
What problem are you facing i cant understand?

Anonymous said...

Hey Rafay, when i type the command "nbtstat -A , it tell me "host not found"!!!! Can you tell me what to do please!!!

Anonymous said...

can i hack into the victim's computer by netbios even if the victims computer port 139 is not open????

Anonymous said...

Hey Can you paste me the link of this program i'm having a hard time finding it ://// PS: Love your Work!

Anonymous said...

I just see only shared files on other PC.Is this hacking??? Is there are way to hack WAN/LAN ? :/ Please answer..

Maf on September 1, 2010 at 8:00 AM said...

u can hack an ip address if it's 139 port is open,,,there remain many services opened on an ip on a ports....we just need to scan....after tht we can go in system by exploiting it........if u want to learn exploiting.....add me....amrit_pal500@yahoo.com.........very nice tutorials....rafay...can i got ur id to add u......

Anonymous said...

how to shut the firewall sir to prevent syntax error plz tell

Danny said...

Hi can you tell me if with Cain and Abel there is anyway to view the passwords someone using my wireless network is using for gmail ,facebook etc .Thanks

HASEEB ULLAH on December 10, 2010 at 6:00 AM said...

It asks for user name and password int the end...how to find them ??????

Anonymous said...

Firstly its a cool tutorial dear,
And is there any way to hack the unshared data.
If yes will you explain it.
Thnx in regards.

Anonymous said...

Firstly heartfull tnnx for this good tutorial,
Will u tell me how to hack even unshared data once we locate the computer we want to hack using commands

MAX on December 22, 2010 at 8:51 PM said...

You can Simply do this using netscan software it will scan all computers in network and shows a plus sign beside those computers who have Shared Drive just click it and have fun

The Big J on January 7, 2011 at 5:34 PM said...

those ip addresses look like u are in the same network as the other computers!!

I dont think its this easy to hack into computers outside of ur network!

Anonymous said...

while using net view command it shows "THERE ARE NO ENTRIES IN THE LIST" what does it mean & how can it be solved??

Rafay Baloch on January 20, 2011 at 2:05 AM said...

@Anonymous
Switch to another target, File and printer sharing is disabled on the target PC

jenson said...

hii this is jenson
this trick worked for me but the problem is that when i mapped the drive i saw my own shared c dive and not his please help

Anonymous said...

what is a netbios password.

Anonymous said...

woooooooooooooooaaaah!! Good job! Thx for all!!

Anonymous said...

i want to break a site password. i know its user name, how can i do that. kindly do infrom me at nazia.shiekh@yahoo.com

Anonymous said...

what r the softwares u used >?????

Anonymous said...

where can i get netbios hacking tool for free?
can anyone give me the link???

cht bull on June 29, 2011 at 9:17 AM said...

hollo bro y ned a code to kill my victims firewall .. it is ther somthing like that that i can do it remotly

Anonymous said...

it dose not stop, continously scaning MAC addresses

Anonymous said...

WELL I CANT OPEN NBTSTANTS x( I PRESS RUN>NBTSTATS AND WINDOW SHOWS IN 1 MILISECOND AND THEN GONE,WHAT TO DO?

Anonymous said...

i have now the ip add of the bank to be hacked in..how can i go directly to its data base? hehe

Anonymous said...

Wish it was all that easy as I would love the registered user data file from a website run by criminals has defrauded thousands from unsuspecting people.

Anonymous said...

where is download this Software. (net bios) plz help me

Anonymous said...

how to reconnect to the target after disconnecting ?

XryanXcoreX said...

Ok please someone help... How can i connect to his specific computer if he has a router and doesent have same ip as me?>

Anonymous said...

Error 53 is coming when I use Net View, please advice

Anonymous said...

Hello

nice tutorial. Still; I missi a basic point, do you need to be on the same WAN/LAN to be able to target a machine?
Thanks
mmm

Sick HAcker on November 5, 2011 at 11:30 PM said...

kindly tell Me the commands To shut these Drive off ,after You have Done Your hacking of drives...how to shut down the drives

Anonymous said...

the dialog box from the blue cross is working, I mean that when the test cannot commence and the range is error or something like that... please fill me in

jishant on December 26, 2011 at 7:55 AM said...

i want to hack wireless network anybody know how to hack it?
it is possible with this software?

jishant on December 26, 2011 at 7:58 AM said...

i want to hack wireless network anybody know about it?
it is possible with this software? pls tell me.

Anonymous said...

brother say the program name with download link please

Anonymous said...

Just google for Cain and Abel Windows download link.

Anonymous said...

Bro, i need your help. Recently an IT personnel had came to our office and blocked all the internet access from the Server itself, by only limiting us to view only the company website. I've somehow got the Ip Address of the server. They're using D-link type Fast Ethernet Switch. I need to get into their settings from an open web source using 192.168.0.1, but it's aksing for Username and password. The defaults have been tried, but no avail. I need to sniff out their password and username. Is it possible for you to help.

Anonymous said...

Do you live off of lies? Or do you thrive on truth? Find out here!
kadobi@hotmail.fr

Anonymous said...

hey i have tried 'nbtstat' and net view now when i go to 'net use' it is giving me 'system error 67 has occurred'. What could be the problem? and if at there is a way to disable remote firewall?

Afffan on February 21, 2012 at 11:00 AM said...

hei..do u have any idea to hack to a computer or to get into a computer in a different network in someother place which is far away from my computer???i am using a mac book ios x..
thank u.

Anonymous said...

whenever i type net.......ex.net view or net use...and hit enter its says net is not recognized as an internal or external command,program or batch file......what to do help.....and reply

Anonymous said...

It's a lot easier to just use the normal Windows Network display and select a PC and drive from the GUI. This isn't hacking, it's really just telling you how to use nbtstat ....

Anonymous said...

Well, I didn't want to cause any trouble, so I did it to my own computer put when I i do those last 2 commands, well, the next to last want giv me the hard drive name, and the last I type in the command a =nd ecvery thing like you said to do, but it says somthing about an error...

Whats goin on?

Anonymous said...

hi rafay it is too old and the percent to access is 1%
hac_@live.com

Anonymous said...

Hehehe now I can view everything the user has put in the shared folder like a folder with pics in it... Im such an awesome hacker >>> JUNK <<<

aditya on June 23, 2012 at 5:00 AM said...

Hey there is a problem while using dis trick...

Whenever i used "net view \\(Ip adress)" it shows that "system error 5 has occurred ".... what to do with this???

Plzzzzz help me!!!!!!!!

aditya on June 23, 2012 at 5:01 AM said...

Hey there is a problem while using dis trick...

Whenever i used "net view \\(Ip adress)" it shows that "system error 5 has occurred ".... what to do with this???

Plzzzzz help me!!!!!!!!

Anonymous said...

Guys i got a problem it never ends the scan...
what is hapenning?????????????????

plz help me

Anonymous said...

hey what we can do with the pc of people sitting on the internet if we have there externel ip address

Anonymous said...

is it possible without knowing network computer password???????

Anonymous said...

This ip hack my com 109.237.33.252
Please how i cant hack this ip

Anonymous said...

follow the link below that tell firewall enable/disable tips through command prompt

http://helpdeskgeek.com/networking/windows-firewall-command-prompt-netsh/

Anonymous said...

everyone wanna hack everyone

, i creat a simple software programe is a touche from exploit and bios +
networking i call it CORDOBA !. if somebody wana know more about it contact me kadobi@hotmail.fr

Phillip said...

Nice 3 1/2 floppy disk drive.

Harkirat Saran on August 4, 2012 at 3:43 AM said...

When I use this command: "nbtstat -a IPaddress" it shows "Host not found...What to do?

Anonymous said...

hi,when i type net use k: \\(victim's ip address)\(sharedDocs),why it need username and password of (victim's ip address)?have any solution can share with me?thanks~

Anonymous said...

I also facing same this problem please anybody help all of us.

((( hi,when i type net use k: \\(victim's ip address)\(sharedDocs),why it need username and password of (victim's ip address)?have any solution can share with me?thanks~ )))

Anonymous said...

Where the hell is the download

Anonymous said...

Can someone help me hack into a computer ? want to delete some files about me. I know the IP address, someone plse help - sherry993@rediffmail.com

Anonymous said...

Noobs,

Noobs everywhere. . .

Anonymous said...

A.O.A.Thanks But If you could tell a way how to bypass the firewall security.

Shawar Khan SK on October 31, 2012 at 4:04 AM said...

system error 5 has occured
access denied.

bro how can i disable firewall of a pc?

Anonymous said...

yo same question as "Anonymous 10"
i would type in "nbtstat -a (ip adress)and results......HOST NOT FOUND. what do i do??? + i tried "nbtstat -A (ip adress) it would give me all the info abot the s's and a's function!!
PLEASE HELP MOI

Anonymous said...

This is not a hack! You just use windows share function! Hack is when you access password protected data!

Anonymous said...

WHEN WE USE NET VIEW \\(IP ADDRESS) , IT SAYS, "SYSTEM ERROR 5 HAS OCCURED" ,, WHAT DOES IT MEAN??

Verpalen on June 3, 2013 at 11:28 PM said...

Does this work with smartphones aswell ?

Anonymous said...

at the last when i open the disk which i hacked was my disk
help me..............

Suraj Lama on May 28, 2014 at 11:04 PM said...

hello sir this post was very use ful but system error 5 has occur how can i gain acess?

Anonymous said...

Sir, how could I know that my pc is hacked. Sometimes I find my browsers closes for seconds automatically while chatting with friend and resumed automatically to where i was. Is there any awy check if my pc was hacked or not. Please help me..........

muzammil on July 22, 2014 at 3:48 AM said...

You used proxies then your data and information is been secure therefor hacker cannot hack your system or data your all personal data is secureHidemyass Proxy

Anonymous said...

ping not working

Dare to ask? :)

Blog Archive

 

Recent Comments

About

Rafay Baloch is an Independent security researcher, Internet marketer, Entrepreneur and a SEO consultant, He is the founder of RHA blog and multiple other blogs. Rafay got famous after finding a Remote Code Execution bug inside PayPal for which PayPal awarded him a sum of 10,000$ Read More..

Join In!

RHA © 2013. All Rights Reserved.