5.26.2012

Remote Network Penetration via NetBios Hack on a windows PC

Remote Network Penetration via NetBios Hack on a windows PC


Today onwards you guys out there will get some interesting post on hacking stuff this is my first post so hope to see a good response…cutting the crap lets get down to work

NetBIOS Hacking,What is it?

NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

How can this be of use to me?

Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

What do I need?

Windows OS Cain and Abel (http://www.oxid.it/)

Step 1, Finding the target.

So first off all we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross. Another window will pop up, make sure “All host in my subnet” is selected, and then click ok. It should begin to scan.
Cain and Abel
Cain and Abel
Beginning the scan
Beginning the scan
Scan in progress
Scan in progress
Then IP’s, computer names, and mac addresses will show up.
Now remember the IP address of the computer you are going to be breaking into.
If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
During the next step we will begin our trial and error.
Finding the IP address of the target.
Finding the IP address of the target.

Part 2, Trial and Error

Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt.
I am only doing this to avoid confusion.
Let’s get back to the hacking.
Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.”
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private information)
Our target is available
Our target is available
IF it didn’t work, meaning that the target is not online, it will look something like this:
Our target is not online.
Our target is not online.
If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.

Part 3, Gathering the Information.

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.”
This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.
Checking if file sharing is enabled
Checking if file sharing is enabled
Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.
The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.
The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.
The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup.

Step 4, Breaking In

Finally it’s time.
By now we know: that our target is online, our target has file sharing, and our target’s computer name.
So it’s time to break in.
We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\192.168.1.103”
Finding the share name
Finding the share name
We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.
All’s that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G…,” for a different target.
NetBIOS Hacking
NetBIOS Hacking
As you can see, for my hack I have already used “K,” so I used “G” instead.
You may also do the same for multiple hacks.
If it worked, it will say “The command completed successfully.”
If not, you will have to go retrace you steps.
Now open up “my computer” under the start menu, and your newly created network drive should be there.
NETBIOS hacking
NETBIOS hacking
Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
If you are just doing this to hack something, then go explore it and have some well deserved fun!
Congratulation you are done!

Commands used in this tutorial:

PING
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)
Default null session attack.(same process using just cmd)
  1. A null session attack basicly uses what is called a samba share to get access to the victims share, {ipc$, admin$, etc.}
  2. This is only for windows xp/vista. Well this is a very simple but effective method of “rooting” a box.
  3. Open CMD > Net View
  4. [Shows all hosts on the network]
    > nbtstat -a HOST
    [determines if the workgroup is open, if not try another comp]
    > net view HOST
    [shows open shares being used; ipc$ doesn't automatically show. But if C is open simply type net use \\HOST \c$; then you have root!]
    >net use \\HOST \SHARE /u:USER_NAME
    [ok so you can ushly use the share IPC$, and the user of admin]
  5. Now go to your local network and open your victims folders
  6. To close the connection type: net use \\HOST /delete
Source : http://techbu.com/2009/09/12/remote-network-penetration-via-netbios-hack-on-a-windows-pc

How to make alive stats in ur blog

1. U go to  http://radarurl.com/#
 (like this picture)











2. Copy HTML Code in Step 2 Like Above the Picture.

3. Go to ur blog....n Add Gadget 

4. Paste in the HTML/JAVA Gadget..

5. Finish

5.25.2012

How to capture streaming videos from the Internet



How to capture streaming videos from the Internet




Many websites like YouTube use a Flash Video format that enables highly-compressed streaming video to effectively play in most browsers. However, the inconvenience with this type of format is that you will not be able to download it by using your Save Target option.

There are three common ways available to capture streaming videos online to your computer:

1. Use download-helper websites
2. Capture the video using a Firefox extension
3. Save the video using commercial software

Download-helper Websites

KeepVid and YouTube Downloader are download-helper websites that allow users to provide them with the video links. These videos will then be catalogued and uploaded to the site. They are not video hosting websites like YouTube or Dailymotion - they provide a browser-based service as the user only has to enter the video's URL in the field provided and choose its source from the list. The file formats can be converted into Mpeg video formats on Keepvid.

Firefox extension

Mozilla Firefox is a web browser that allows you to grab online videos with its additional Video Downloader extension. This application runs both on Windows and Mac OS X operating systems.

Firefox can be downloaded at http://www.mozilla.com/en-US/firefox/

Install Mozilla Firefox
  • 1. Choose Save when the file download window opens and select the path you want the extension to be saved in.
  • 2. When the download is completed, click Open.
  • 3. This will launch the Set Up Wizard and you will be free to make all the necessary changes concerning its installation. If you do not want to make any changes to the installation settings, check the box labeled "I agree to the terms and conditions of the program" and proceed by clicking Next until installation completes.


Install Mozilla Firefox Video Downloader

When Firefox's installation is complete, you can download the Video Downloader extension at https://addons.mozilla.org/en-US/firefox/addon/3006
  • 1. When prompted to download the software extension, click Save.
  • 2. Save the add-on in the "Extensions" folder that is within the Firefox folder in your Program Files.
  • 3. When the download is complete, click "Close".
  • 4. When you will open the Mozilla Firefox browser window, it will ask you if you want to install the add-on. Click "Install Now".
  • 5. After installation, the toolbar should have the icon located to the left-hand side of your address bar.
  • 6. You should first load the page containing the video stream to use this option. Once you have loaded the right page, click on the down arrow next to your video downloader icon and choose the format you want to save the video. By default it will save it as an FLV format file.
  • 7. Choose where to save the video.


Note: Winamp's latest versions can play FLV format files. You can download the program at: http://www.winamp.com/player

Commercial softwares

There is commercial software available online that require installation. They can be used to download the streaming videos to your computer. Some have the option to convert your FLV format files into Mpeg or AVI files.

CamStudio
Download Link: http://camstudio.org/
Type: Free

Replay AV
Download Link: http://www.applian.com/replay-av/
Type: Trial version

WM Recorder
Download Link: http://www.wmrecorder.com/
Type: Trial version

Info

If you regularly watch videos on YouTube, the easiest way to download videos from this website is using of Real player:
  • Download and install a free version of Real player
  • A folder named Real Player downloads will be automatically created in /My Documents/Video
  • Launch a video on Youtube
  • A small option should be present at the top of the video saying "Download Video"
  • Click on it and the video will be saved on your hard drive

 Sumber : http://en.kioskea.net/faq/140-how-to-capture-streaming-videos-from-the-internet

5.18.2012

Hide Folder With bacth File..........

1. Open Notepad and copy this code : ren “FOLDERNAME” “FOLDERNAME“.{21EC2020-3AEA-1069-A2DD-08002B30309D} “FOLDERNAME” change in to name of your folder, in this example “FOLDERNAME” is locked.My code looks like this ren locked.{21EC2020-3AEA-1069-A2DD-08002B30309D} locked Save notepad file like lock.bat in My Documents. In option Save as Type, select All Files

2. Open another notepad file and copy this code: ren “FOLDERNAME“.{21EC2020-3AEA-1069-A2DD-08002B30309D} “FOLDERNAME” , Save file as in Step 2, just choose a different filename , like unlock.bat


 3. Selamat mencoba... Example file dowbload this link :