download.bg
 Вход Списание  Новини  Програми  Статии  Форум  Чат   Абонамент  Топ95   Архив 

MS-DOS и проникването в чужд компютър ?!?

< 1 2 3 >

Автор
Съобщение
anonymous
Нед, 19.08.07, 22:26
ПЛС някой ако може да обасни как става тая работа ! Чрез Google изнамерих доста интересни марериали и ръководства, но почти всички се отнасят до Windows 95, 98, NT а не до XP който е най-използвания продукт ( поне за по-обикнивенните потребители ) !
Имам и още един въпрос, който се отнася до конфигурирането на файла lmhost.sam, който се намира в C:\WINDOWS\system32\drivers\etc\ ! Та питам за него защото чрез Google намерих
три урока за проникване в чуждо PC чрез MS-DOS и там се споменава ( и се обяснява малко за конфигурирането на този файл ) . ПЛС хелп .
Поствам и урочетата в случай, че някой иска да го прочете ( на английски са ама sorry ) :

Part I: The Magic of DOS
In this guide you will learn how to telnet , forge email, use
nslookup and netcat with Windows XP.
So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How can you use XP in a way that sets you apart from the boring millions of ordinary users?
****************
Luser Alert: Anyone who thinks this GTMHH will reveal how to blow up people's TV sets and steal Sandra Bullock's email is going to find out that I won't tell them how.
****************
The key to doing amazing things with XP is as simple as D O S. Yes, that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS version. Various versions of command.com come with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.
The other DOS, which comes only with the XP, 2000 and NT operating systems, is cmd.exe. Usually cmd.exe is better than command.com because it is easier to use, has more commands, and in some ways resembles the bash shell in Linux and other Unix-type operating systems. For example, you can repeat a command by using the up arrow until you back up to the desired command. Unlike bash, however, your DOS command history is erased whenever you shut down cmd.exe. The reason XP has both versions of DOS is that sometimes a program that won?t run right in cmd.exe will work in command.com
****************
Flame Alert: Some readers are throwing fits because I dared to compare DOS to bash. I can compare cmd.exe to bash if I want to. Nanny nanny nah nah.
****************
DOS is your number one Windows gateway to the Internet, and the open sesame to local area networks. From DOS, without needing to download a single hacker program, you can do amazingly sophisticated explorations and even break into poorly defended computers.
****************
You can go to jail warning: Breaking into computers is against the law if you do not have permission to do so from the owner of that computer. For example, if your friend gives you permission to break into her Hotmail account, that won't protect you because Microsoft owns Hotmail and they will never give you permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN permission before demonstrating that you can hack on a school computer.
****************
So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying something like this:
Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp.
C:\>
Your first step is to find out what commands you can run in DOS. If you type "help" at the DOS prompt, it gives you a long list of commands. However, this list leaves out all the commands hackers love to use. Here are some of those left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them. We will cover NetBIOS commands in the next Guide to XP Hacking.

How to Telnet with Windows XP
The queen of hacker commands is telnet. To get Windows help for
telnet, in the cmd.exe window give the command:
C:\>telnet /?
Here's what you will get:
telnet [-a][-e escape char][-f log file][-l user][-t term][host
[port]] -a Attempt automatic logon. Same as -l option except uses
the currently logged on user's name.
-e Escape character to enter telnet client prompt.
-f File name for client side logging
-l Specifies the user name to log in with on the remote system.
Requires that the remote system support the TELNET ENVIRON
option.
-t Specifies terminal type.
Supported term types are vt100, vt52, ansi and vtnt only.
host Specifies the hostname or IP address of the remote computer
to connect to.
port Specifies a port number or service name.
****************
Newbie note: what is a port on a computer? A computer port is sort of like a seaport. It's where things can go in and/or out of a computer. Some ports are easy to understand, like keyboard, monitor, printer and modem. Other ports are virtual, meaning that they are created by software. When that modem port of yours (or LAN or ISDN or DSL) is connected to the Internet, your computer has the ability to open or close any of over 65,000 different virtual ports, and has the ability to connect to any of these on another computer - if it is running that port, and if a firewall doesn?t block it.
****************
****************
Newbie note: How do you address a computer over the Internet? There are two ways: by number or by name.
****************
The simplest use of telnet is to log into a remote computer. Give the
command:
C:/>telnet targetcomputer.com (substituting the name of the computer you want to telnet into for targetcomputer.com)
If this computer is set up to let people log into accounts, you may
get the message:
login:
Type your user name here, making sure to be exact. You can't swap between lower case and capital letters. For example, user name Guest is not the same as guest.
****************
Newbie note: Lots of people email me asking how to learn what their user name and password are. Stop laughing, darn it, they really do. If you don't know your user name and password, that means whoever runs that computer didn't give you an account and doesn't want you to log on.
****************
Then comes the message:
Password:
Again, be exact in typing in your password.
What if this doesn't work?
Every day people write to me complaining they can't telnet. That is
usually because they try to telnet into a computer, or a port on a
computer that is set up to refuse telnet connections. Here's what it
might look like when a computer refuses a telnet connection:
C:\ >telnet 10.0.0.3
Connecting To 10.0.0.3...Could not open connection to the host, on port 23. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.
Or you might see:
C:\ >telnet techbroker.com
Connecting To techbroker.com...Could not open connection to the host, on port 23.
No connection could be made because the target machine actively
refused it.
If you just give the telnet command without giving a port number, it
will automatically try to connect on port 23, which sometimes runs a
telnet server.
**************
Newbie note: your Windows computer has a telnet client program,
meaning it will let you telnet out of it. However you have to install
a telnet server before anyone can telnet into port 23 on your
computer.
*************
If telnet failed to connect, possibly the computer you were trying to
telnet into was down or just plain no longer in existence. Maybe the
people who run that computer don't want you to telnet into it.
How to Telnet into a Shell Account
Even though you can't telnet into an account inside some computer, often you can get some information back or get that computer to do something interesting for you. Yes, you can get a telnet connection to succeed -without doing anything illegal --against almost any computer, even if you don't have permission to log in. There are many legal things you can do to many randomly chosen computers with telnet. For example:
C:/telnet freeshell.org 22
SSH-1.99-OpenSSH_3.4p1
That tells us the target computer is running an SSH server, which enables encrypted connections between computers. If you want to SSH into an account there, you can get a shell account for free at
. You can get a free SSH client program from
.
One reason most hackers have shell accounts on Internet servers is because you can meet the real hackers there. When you've logged in, give the command w or who. That gives a list of user names. You can talk to other users with tht talk command. Another fun thing, if your shell account allows it, is to give the command
ps -auxww
It might tell you what commands and processes other users are running. Ask other users what they are doing and they might teach you something. Just be careful not to be a pest!
***************
You can get punched in the nose warning: Your online provider might kick you off for making telnet probes of other computers. The solution is to get a local online provider and make friends with the people who run it, and convince them you are just doing harmless, legal explorations.
*************
Sometimes a port is running an interesting program, but a firewall won't let you in. For example, 10.0.0.3, a computer on my local area network, runs an email sending program, (sendmail working together with Postfix, and using Kmail to compose emails). I can use it from an account inside 10.0.0.3 to send emails with headers that hide from where I send things.
If I try to telnet to this email program from outside this computer,
here's what happens:
C:\>telnet 10.0.0.3 25
Connecting To 10.0.0.3...Could not open connection to the host, on
port 25.
No connection could be made because the target machine actively
refused it.
However, if I log into an account on 10.0.0.3 and then telnet from
inside to port 25, here's what I get:
Last login: Fri Oct 18 13:56:58 2002 from 10.0.0.1
Have a lot of fun...
cmeinel@test-box:~> telnet localhost 25
Trying ::1...
telnet: connect to address ::1: Connection refused
Trying 127.0.0.1... [Carolyn's note: 127.0.0.1 is the numerical
address meaning localhost, the same computer you are logged into] Connected to localhost.
Escape character is '^]'.
220 test-box.local ESMTP Postfix
The reason I keep this port 25 hidden behind a firewall is to keep
people from using it to try to break in or to forge email. Now the
ubergeniuses reading this will start to make fun of me because no
Internet address that begins with 10. is reachable from the Internet.
However, sometimes I place this "test-box" computer online with a
static Internet address, meaning whenever it is on the Internet, it
always has the same numerical address. I'm not going to tell you what its Internet address is because I don't want anyone messing with it. I just want to mess with other people's computers with it, muhahaha. That's also why I always keep my Internet address from showing up in the headers of my emails.
***************
Newbie note: What is all this about headers? It's stuff at the
beginning of an email that may - or may not - tell you a lot about
where it came from and when. To see full headers, in Outlook click
view -> full headers. In Eudora, click the "Blah blah blah" icon.

How to Forge Email with Windows XP Telnet
Want a computer you can telnet into and mess around with, and not get into trouble no matter what you do to it? I've set up my
techbroker.com (206.61.52.33) with user xyz, password guest for you to play with. Here's how to forge email to xyz@techbroker.com using
telnet. Start with the command:
C:\>telnet techbroker.com 25
Connecting To Techbroker.com
220 Service ready
Now you type in who you want the message to appear to come from:
helo santa@techbroker.com
Techbroker.com will answer:
250 host ready
Next type in your mail from address:
mail from:santa@techbroker.com
250 Requested mail action okay, completed
Your next command:
rcpt to:xyz@techbroker.com
250 Requested mail action okay, completed
Your next command:
data
354 Start main input; end with .
Newbie note: just means hit return. In case you can't see that little period between the s, what you do to end composing your email is to hit enter, type a period, then hit enter again.
Anyhow, try typing:
This is a test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel
Connection to host lost.
Using techbroker's mail server, even if you enable full headers, the
message we just composed looks like:
Status: R
X-status: N
This is a test.
That's a pretty pathetic forged email, huh? No "from", no date.
However, you can make your headers better by using a trick with the data command. After you give it, you can insert as many headers as you choose. The trick is easier to show than explain:
220 Service ready
helo santa@northpole.org
250 host ready
mail from:santa@northpole.com
250 Requested mail action okay, completed
rcpt to:
250 Requested mail action okay, completed
data
354 Start main input; end with .
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
.
250 Requested mail action okay, completed
quit
221 Service closing transmission channel
Connection to host lost.
The message then looks like:
from:santa@deer.northpole.org
Date: Mon, 21 Oct 2002 10:09:16 -0500
Subject: Rudolf
This is a Santa test.
The trick is to start each line you want in the headers with one word
followed by a colon, and the a line followed by "return". As soon as
you write a line that doesn't begin this way, the rest of what you
type goes into the body of the email.
Notice that the santa@northpole.com from the "mail from:" command didn't show up in the header. Some mail servers would show both "from" addresses.
You can forge email on techbroker.com within one strict limitation.
Your email has to go to someone at techbroker.com. If you can find any way to send email to someone outside techbroker, let us know, because you will have broken our security, muhahaha! Don't worry, you have my permission.
Next, you can read the email you forge on techbroker.com via telnet:
C:\>telnet techbroker.com 110
+OK <30961.5910984301@techbroker.com> service ready
Give this command:
user xyz
+OK user is known
Then type in this:
pass test
+OK mail drop has 2 message(s)
retr 1
+OK message follows
This is a test.
If you want to know all possible commands, give this command:
help
+OK help list follows
USER user
PASS password
STAT
LIST [message] RETR message
DELE message
NOOP
RSET
QUIT
APOP user md5
TOP message lines
UIDL [message] HELP
Unless you use a weird online provider like AOL, you can use these
same tricks to send and receive your own email. Or you can forge email to a friend by telnetting to his or her online provider's email
sending computer(s).

редактиран от anonymous на 19.08.07 22:27
anonymous
Нед, 19.08.07, 23:30
Ми то не е толкова подробно ! Просто съм добавил 3 урока за хакване на комп. чрез MS-DOS !
anonymous
Пон, 20.08.07, 00:11
И какво точно имаш предвид за lmhost.sam фаила
а за командите то си пише START - RUN ->cmd и там си пишеш примерно telnet /? и ти излизат всичките команди също така и за net use и т.н.
anonymous
Пон, 20.08.07, 09:36
Питам за lmhost.sam защото в нета на 1-2 места четох че ако се конфигурира по подходящ начим може да се намери компютъра на жертвата чрез Start->Seatch->Computers or people като се напише IP или име на компютър и по този начин да се проникне все едно отваряш папка ! Аз лично се съмнявам да стане ама все пак искам да пробвам !
anonymous
Пон, 20.08.07, 09:42
И то по-точно го четох в този урок ( пак на английски ама ко да се прай аз мога да си го преведа за вас нз )

            --------------hacking the bios--------------

                           by anand bhaskar.

hey friends,

i know hacking with bios is considered lame by the hackers n it indeed

is lame but i m sure this gives a good practice at the intial stages n

some idea of what the hell it like getting into someone else's computer.

the basic limitation of this method is that only shared files can b

accessed.however there r ways to hack the not shared one's too but

is all i wish too provide u all now.enjoy.

 

introduction

 

1. Hardware and Firmware

 

1a. The BIOS

 

The BIOS, short for Basic Input/Output Services, is the control

program of the PC. It is responsible for starting up your computer,

transferring control of the system to your operating system, and

for handling other low-level functions, such as disk access.

 

NOTE that the BIOS is not a software program, insofar as it is

not purged from memory when you turn off the computer. It's

firmware, which is basically software on a chip. :)

 

A convenient little feature that most BIOS manufacturers include

is a startup password. This prevents access to the system until

you enter the correct password.

 

If you can get access to the system after the password has been

entered, then there are numerous software-based BIOS password

extractors available from your local H/P/A/V site. :)

 

                           

        NETBIOS/NBTSTAT - What does it do?

 

2. NETBIOS, also known as NBTSTAT is a program run on the Windows system and is used for identifying a remote network or computer for file sharing enabled. We can expoit systems using this method. It may be old but on home pc's sometimes it still works great. You can use it on your friend at home or something. I don't care what you do, but remember, that you are reading this document because you want to learn. So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there are two ways, but one's faster.

 

Method 1

-===============-

Start

Programs

MSDOS PROMPT

Type NBTSTAT

-===============-

 

Method 2

-===============-

Start

Run

Type Command

Type NBTSTAT

-===============-

 

(Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.)

 

Ok! Now since you're in the DOS command under NBTSTAT, you're probably wondering what all that crap is that's on your screen. These are the commands you may use. I'm only going to give you what you need to know since you are striving to be l33t. Your screen should look like the following:

 

 

----------------------------------------------------------------------------------------------

 

NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n]

       [-r] [-R] [-RR] [-s] [-S] [interval] ]

 

  -a (adapter status) Lists the remote machine's name table given its name

  -A (Adapter status) Lists the remote machine's name table given its

                       IP address.

  -c (cache) Lists NBT's cache of remote [machine] names and their IP

addresses

  -n (names) Lists local NetBIOS names.

  -r (resolved) Lists names resolved by broadcast and via WINS

  -R (Reload) Purges and reloads the remote cache name table

  -S (Sessions) Lists sessions table with the destination IP addresses

  -s (sessions) Lists sessions table converting destination IP

                       addresses to computer NETBIOS names.

  -RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refr

esh

 

  RemoteName Remote host machine name.

  IP address Dotted decimal representation of the IP address.

  interval Redisplays selected statistics, pausing interval seconds

               between each display. Press Ctrl+C to stop redisplaying

              statistics.

 

 

C:\WINDOWS\DESKTOP>

 

-----------------------------------------------------------------------------------------------

 

The only two commands that are going to be used and here they are:

 

-a (adapter status) Lists the remote machine's name table given its name

-A (Adapter status) Lists the remote machine's name table given its IP address.

 

    Host Names

 

3. Now, the -a means that you will type in the HOST NAME of the person's computer that you are trying to access. Just in case you don't have any idea what a Host Name looks like here's an example.

 

123-fgh-ppp.internet.com

 

there are many variations of these adresses. For each different address you see there is a new ISP assigned to that computer. look at the difference.

 

abc-123.internet.com

ghj-789.newnet.com

 

these are differnet host names as you can see, and, by identifying the last couple words you will be able to tell that these are two computers on two different ISPs. Now, here are two host names on the same ISP but a different located server.

 

123-fgh-ppp.internet.com

567-cde-ppp.internet.com

 

    IP Addresses

 

4. You can resolce these host names if you want to the IP address (Internet Protocol)

IP addresses range in different numbers. An IP looks like this:

 

201.123.101.123

 

Most times you can tell if a computer is running on a cable connection because of the IP address's numbers. On faster connections, usually the first two numbers are low. here's a cable connection IP.

 

24.18.18.10

 

on dialup connections IP's are higher, like this:

 

208.148.255.255

 

notice the 208 is higher than the 24 which is the cable connection.

 

REMEMBER THOUGH, NOT ALL IP ADDRESSES WILL BE LIKE THIS.

Some companies make IP addresses like this to fool the hacker into believing it's a dialup, as a hacker would expect something big, like a T3 or an OC-18. Anyway This gives you an idea on IP addresses which you will be using on the nbtstat command.

 

     Getting The IP Through DC (Direct Connection)

 

5. First. You're going to need to find his IP or host name. Either will work. If you are on mIRC You can get it by typing /whois (nick) ...where (nick) is the persons nickname without parenthesis. you will either get a host name or an IP. copy it down. If you do not get it or you are not using mIRC then you must direct connect to their computer or you may use a sniffer to figure out his IP or host name. It's actually better to do it without the sniffer because most sniffers do not work now-a-days. So you want to establish a direct connection to their computer. OK, what is a direct connection? When you are:

 

Sending a file to their computer you are directly connected.

AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted.

ICQ when sending a file or a chat request acception allows a direct connection.

Any time you are sending a file. You are directly connected. (Assuming you know the user is not using a proxy server.)

Voice Chatting on Yahoo establishes a direct connection.

 

If you have none of these programs, either i suggest you get one, get a sniffer, or read this next statement.

 

If you have any way of sending thema link to your site that enables site traffic statistics, and you can log in, send a link to your site, then check the stats and get the IP of the last visitor. It's a simple and easy method i use. It even fool some smarter hackers, because it catches them off guard. Anyway, once you are directly connected use either of the two methods i showed you earlier and get into DOS. Type NETSTAT -n. NETSTAT is a program that's name is short for NET STATISTICS. It will show you all computers connected to yours. (This is also helpful if you think you are being hacked by a trojan horse and is on a port that you know such as Sub Seven: 27374.) Your screen should look like this showing the connections to your computer:

 

------------------------------------------------------------------------------------------------

 

C:\WINDOWS\DESKTOP>netstat -n

 

Active Connections

 

  Proto Local Address Foreign Address State

  TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED

  TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED

  TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT

  TCP 172.255.255.82:1413 205.188.8.7:26778 ESTABLISHED

  TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED

 

C:\WINDOWS\DESKTOP>

 

------------------------------------------------------------------------------------------------

 

The first line indicated the Protocol (language) that is being used by the two computers.

TCP (Transfer Control Protocol) is being used in this and is most widely used.

 

Local address shows your IP address, or the IP address of the system you on.

 

Foreign address shows the address of the computer connected to yours.

 

State tells you what kind of connection is being made ESTABLISHED - means it will stay connected to you as long as you are on the program or as long as the computer is allowing or is needing the other computers connection to it. CLOSE_WAIT means the connection closes at times and waits until it is needed or you resume connection to be made again. One that isn't on the list is TIME_WAIT which means it is timed. Most Ads that run on AOL are using TIME_WAIT states.

 

the way you know the person is directly connected to your computer is because of this:

 

------------------------------------------------------------------------------------------------

 

C:\WINDOWS\DESKTOP>netstat -n

 

Active Connections

 

  Proto Local Address Foreign Address State

  TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED

  TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED

  TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT

  TCP 172.255.255.82:1413 abc-123-ppp.webnet.com ESTABLISHED

  TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED

 

C:\WINDOWS\DESKTOP>

 

------------------------------------------------------------------------------------------------

 

Notice the host name is included in the fourth line instead of the IP address on all. This is almost ALWAYS, the other computer that is connected to you. So here, now, you have the host name:

 

abc-123-ppp.webnet.com

 

If the host name is not listed and the IP is then it NO PROBLEM because either one works exactly the same. I am using abc-123-ppp.webnet.com host name as an example. Ok so now you have the IP and/or host name of the remote system you want to connect to. Time to hack!

 

Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's the crap again. Well, now time to try out what you have leanred from this document by testing it on the IP and/or host name of the remote system. Here's the only thing you'll need to know.

 

IMPORTANT, READ NOW!!!

 

-a (adapter status) Lists the remote machine's name table given its name

-A (Adapter status) Lists the remote machine's name table given its IP address.

 

Remember this?

Time to use it.

 

-a will be the host name

-A will be the IP

 

How do i know this?

Read the Statements following the -a -A commands. It tells you there what each command takes.

 

So have you found which one you have to use?

 

GOOD!

Time to start.

 

Using it to your advantage

 

6. Type this if you have the host name only.

NBTSTAT -a (In here put in hostname without parenthesis)

 

Type this is you have the IP address only.

NBTSTAT -A (In here put in IP address without parenthesis)

 

Now, hit enter and wait. Now Either one of two things came up

1. Host not found

2. Something that looks like this:

 

--------------------------------------------

 

               NetBIOS Local Name Table

 

      Name Type Status

   ---------------------------------------------

   GMVPS01 <00> UNIQUE Registered

   WORKGROUP <00> GROUP Registered

   GMVPS01 <03> UNIQUE Registered

   GMVPS01 <20> UNIQUE Registered

   WORKGROUP <1E> GROUP Registered

 

---------------------------------------------

 

If the computer responded "Host not found" Then either one of two things are the case:

 

1. You screwed up the host name.

2. The host is not hackable.

If number one is the case you're in great luck. If two, This system isn't hackable using the NBTSTAT command. So try another system.

 

If you got the table as above to come up, look at it carefully as i describe to you each part and its purpose.

 

Name - states the share name of that certain part of the computer

 

<00>, <03>, <20>, <1E> - Are the Hexidecimal codes giving you the services available on that share name.

 

Type - Is self-explanatory. It's either turned on, or activated by you, or always on.

 

Status - Simply states that the share name is working and is activated.

 

 

Look above and look for the following line:

 

GMVPS01 <20> UNIQUE Registered

 

See it?

GOOD! Now this is important so listen up. The Hexidecimanl code of <20> means that file sharing is enabled on the share name that is on that line with the hex number. So that means GMVPS01 has file sharing enabled. So now you want to hack this. Here's How to do it. (This is the hard part)

 

LMHOST File

 

7. There is a file in all Windows systems called LMHOST.sam. We need to simply add the IP into the LMHOST file because LMHOST basically acts as a network, automatically logging you on to it. So go to Start, Find, FIles or Folders. Type in LMHOST and hit enter. when it comes up open it using a text program such as wordpad, but make sure you do not leave the checkmark to "always open files with this extension" on that. Simply go through the LMHOST file until you see the part:

 

 

 

# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts

# files and offers the following extensions:

#

# #PRE

# #DOM:

# #INCLUDE

# #BEGIN_ALTERNATE

# #END_ALTERNATE

# \0xnn (non-printing character support)

#

# Following any entry in the file with the characters "#PRE" will cause

# the entry to be preloaded into the name cache. By default, entries are

# not preloaded, but are parsed only after dynamic name resolution fails.

#

# Following an entry with the "#DOM:" tag will associate the

# entry with the domain specified by . This affects how the

# browser and logon services behave in TCP/IP environments. To preload

# the host name associated with #DOM entry, it is necessary to also add a

# #PRE to the line. The is always preloaded although it will not

# be shown when the name cache is viewed.

#

# Specifying "#INCLUDE " will force the RFC NetBIOS (NBT)

# software to seek the specified and parse it as if it were

# local. is generally a UNC-based name, allowing a

# centralized lmhosts file to be maintained on a server.

# It is ALWAYS necessary to provide a mapping for the IP address of the

# server prior to the #INCLUDE. This mapping must use the #PRE directive.

# In addtion the share "public" in the example below must be in the

# LanManServer list of "NullSessionShares" in order for client machines to

# be able to read the lmhosts file successfully. This key is under

# \machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionshares

# in the registry. Simply add "public" to the list found there.

#

# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE

# statements to be grouped together. Any single successful include

# will cause the group to succeed.

#

# Finally, non-printing characters can be embedded in mappings by

# first surrounding the NetBIOS name in quotations, then using the

# \0xnn notation to specify a hex value for a non-printing character.

 

Read this over and over until you understand the way you want your connection to be set. Here's an example of how to add an IP the way I would do it:

 

 

#PRE #DOM:255.102.255.102 #INCLUDE

 

Pre will preload the connection as soon as you log on to the net. DOM is the domain or IP address of the host you are connecting to. INCLUDE will automaticall set you to that file path. In this case as soon as I log on to the net I will get access to 255.102.255.102 on the C:/ drive. The only problem with this is that by doin the NETSTAT command while you are connected, and get the IP of your machine. That's why it only works on simple PC machines. Because people in these days are computer illiterate and have no idea of what these commands can do. They have no idea what NETSTAT is, so you can use that to your advantage. Most PC systems are kind of hard to hack using this method now because they are more secure and can tell when another system is trying to gain access. Also, besure that you (somehow) know whether they are running a firewall or not because it will block the connection to their computer. Most home systems aren't running a firewall, and to make it better, they don't know how operate the firewall, therefore, leaving the hole in the system. To help you out some, it would be a great idea to pick up on some programming languages to show you how the computer reads information and learn some things on TCP/IP (Transfer Control Protocol/Internet Protocol) If you want to find out whether they are running a firewall, simply hop on a Proxy and do a port scan on their IP. You will notice if they are running a firewall because most ports are closed. Either way, you still have a better chance of hacking a home system than hacking Microsoft.

 

Gaining Access

7. Once you have added this to you LMHOST file. You are basically done. All you need to do is go to:

 

Start

Find

Computer

 

Once you get there you simply type the IP address or the host name of the system. When it comes up, simply double click it, and boom!

кака.лара
Пон, 20.08.07, 10:27
Баси каква кретения ги друса тия. Не мога да повярвам. Толко ли не може си измислите нещо полезно бе тупани!
nikolatirol
Пон, 20.08.07, 20:21

RE: MS-DOS и проникването в чужд компютър ?!?

” Баси каква кретения ги друса тия. Не мога да повярвам. Толко ли не може си измислите нещо полезно бе тупани! „
Ако можеха щяха да го направят!
insecteater
Пон, 20.08.07, 21:29
Не искам да ти попарвам надеждите. Всичко това което си изписал/копирал просто го изпробвай. И се постарай да бъдеш по-вежлив и широко скроен. Центърът на вселената все още не е установен със сигурност.
anonymous
Нед, 25.11.07, 16:58
a moje bi prosto neiskat da izmislqt neshto polezno ..... a neshto s koeto da rushat ... kato si mislqt che tva e nachinat da se izdignat v obshtestvoto
редактиран от anonymous на 25.11.07 16:58
anonymous
Нед, 25.11.07, 18:31

RE: MS-DOS и проникването в чужд компютър ?!?

” a moje bi prosto neiskat da izmislqt neshto polezno ..... a neshto s koeto da rushat ... kato si mislqt che tva e nachinat da se izdignat v obshtestvoto „

Никога не съм мислил с това да руша с това нещо. Нещо не ми се ходи по "затворища"... Просто ми беше интересно, но след мнението на Кака Лара, която по принцип уважавам разбрах, че няма да стане работата да ми се обясно поне малко... за това и не се занимавам вече. Ако все пак някой има информация да дава...
Единственото, което исках е да си правя базици в часовете по ИТ в даскало... и то да не си мислите, че ще са кой знае кви базици, нищо друго освен затваряне и отваряне на прозорци и програми. Но уви да попиташ нещо учтиво и да ти се отговори, че си тъпо теле... не се вързва някъде.

редактиран от anonymous на 25.11.07 18:32
редактиран от anonymous на 31.10.10 11:59

< 1 2 3 >

Коментар

за нас | за разработчици | за реклама | станете автори | in english  © 1998-2024   Experta Ltd.