Wednesday 2 November 2011

Hacking a PC through NetBios

Hacking a PC through NetBios shares
Finding PCs with shares over a LAN or over internet is very easy. Choose a certain IP range and use Net scan to search through the IP range for PCs with shares. A PC can only have shares if it is connected to a network or has file and printing enabled, so mostly computers with an network card. If you find a computer with a share, use Windows to connect to that share. Go START, RUN and type in "\\IP\sharename". Example "\\198.55.67.244\c" or with the PC name "\\pc1\c" - then you will have access to the share, to delete, copy or rename files or directories, depending what it was shared as, but most people share things with full access and no password. If you find a PC with shares, but when you try and connect to it, it ask you a password, the easy way to crack it is with PQWak, this program brute force cracks the password for you - Win9X only.
Windows NT/XP, works through permissions, so if something is shared, it is shared with permissions to the folder, and permissions is given to an user name. But alot of people make shares with full access to anyone. Win2K/XP accessing an share like the C$ share will ask you an username and password, if there is no password specified by the person who's PC it is.. Trying username as Administrator and password blank. Most people got administrator account password blank, easy way to get onto their shares.
Windows 2000 and XP you can use Venom or Star brute to brute force or dictionary crack local accounts.
If you gain access to someone's hard drive, copy a Trojan server file into their start up folder, and then when they reboot their PC, the Trojan will run and you will have access to their PC with the Trojan.
Read More »

Trojan

Trojans is one of the first things you must learn when you want to hack. A Trojan is a small program you send to someone to infect their PC so you can control their PC, steal passwords, files or just have some fun.

Every Trojan works on a different port, like Sub7, works on port 27374. If you scan a PC and find that port 27374 is open, it means the machine is infected with Sub7. Now of course the Trojan can be set with a password, its up to you to crack it then. Now remember that most Trojans are picked up by Anti Virus software. You need a new released Trojan which AV does not pick up.

The Trojan most people know is Sub7 . Before you can start using the Trojan, you first need a host to infected with a Trojan. A host can be infected in a alot of ways. You can send the host the Trojan server file, and tell them it's an game or a firewall or whatever you like it to be. Best is to rename the file to something they will think is useful like : WindowsXP_update.exe. You can email them this file or put it on a downloads area on a web page, use your imagination. When sending a Trojan through email, remember to ZIP or RAR the file, most email hosts do not allow you to send .exe files.

If you cannot get hold of a undetectable Trojan, you can use a program like Pestil to make the Trojan undetectable. I have tested Pistil with Biforst and it was not detected by NOD or AVG anti virus packages.

You can also bind the Trojan file with another file, any executable file the Trojan can be binded to. Always remember to rename the file, change the program icon and the put a password on the server file. Bind the file with another file and set the file to automatically delete itself after executed, or set it to give an system error.

When you infect a host or find a infected host, it's time to connect. Easy way to find Trojans infect hosts is with Trojan hunter. Choose an IP range to scan through and it will search for trojan infected hosts. When you found an infected host, download the Trojan client from my Trojans page.. Connect with the Trojan to the host IP, to the certain port the Trojan works on and you are ready to take control. Each Trojan uses a diffident port. Here is a list of ports which a certain Trojan works on.

With most Trojans, you will be able to log keystrokes on a PC, even get logged into a file, and when the host is online it will email the keystrokes to an specified email address. Delete or copy files, reboot the PC, make screen captures or disable the screen or mouse. With Sub7 you can do anything on the infected host, just as if you where sitting in front of the PC itself.

Important thing to remember. A Trojan comes with a file called "server.exe". Never run that file on your own PC, it will infect your PC with the Trojan! Use the Trojans configuration file to make changes to the "server.exe" file and then send the file to a victim.

There is also Trojans which has the option to do a reverse connection. Very useful if the person sits behind a router or firewall. After your infected the victims PC, the Trojan will automatically connects to you, thus getting past the problem of connecting through a router or firewall. Remember that if you do not connect to the Internet directly (with a modem) and you sit behind a router, you will need to forward the Trojan ports in your routers configuration if you are doing a reverse connection.

Try out Bi frost RAT or Poison Ivy RAT which can do reverse connections, use full when the host is behind a router.

Most of us do not have a static IP address, I recommend using a service like no-ip which gives you a name like hacker.no-ip.org which can be pinged from anywhere on the internet and it will give your current IP address. Set your reverse connection Trojans to connect to this name.
Read More »