This technique will be taking advantage of Port 139. Most of the time,Port 139 will be opened in the computer. First of all, we will do a port scanning at the target computer which is having IP....
This computer is inside my LAN network. We will scan using zenmap ( scan it using Nmap.)
The below steps will look some what lengthy… But after completion you will have fun
I get the result and it shows Port 139 is opened.
Now you will need both of these following tools:
USER2SID & SID2USER and NetBios Auditing Tool
USER2SID & SID2USER and NetBios Auditing Tool
User2sid and Sid2user are two small utilities for Windows NT, created by Evgenii Rudny, that allow the administrator to query the SAM to find out a SID value for a given account name and vice versa. User2sid.exe can retrieve a SID from the SAM (Security Accounts Manager) from the local or a remote machine and Sid2user.exe can then be used to retrieve the names of all the user accounts and more. These utilities do not exploit a bug but call the functions; LookupAccountName and Lookup AccountSid respectively. These tools can be called against a remote machine without providing logon credentials except those needed for a null session connection. These tools rely on the ability to create a null session in order to work.You can get both of them on the Internet.
After you get both of them,put them in the C:\ directory.
For connecting You now need to create a null session to the target computer.
Now
open the Command Prompt and browse to the USER2SID & SID2USER
folder.There will be 2 tools inside it,one will be USER2SID and another
one will be SID2USER. We will first using USER2SID to get the ID.
We
will test against the Guest account because Guest account is a built in
account. After we get the ID,we need to do some modification on the ID.
We take the ID we get from the guest account and modified it become
“5 21 861567501 1383384898 839522115 500″.
“5 21 861567501 1383384898 839522115 500″.
Please leave out the S-1-,leave out all the – too.
Now
you will see that you get the username of the Administrator account. In
this case,the Administrator account is Administrator. Create a text
file called user.txt and the content will be the username of the Admin
account.
Prepare yourself a good wordlist.
Now put both of them in the same directory with the NetBios Auditing Tool.
Now
we are going to crack the Admin account for the password in order to
access to the target computer. Browse to the NetBios Auditing Tool
directory.
Press on enter and the tool will run through the passlist.
In this case,I have get the password. In order to proof that I can get access to the target computer using this password.
After you press enter,it will prompt you for the username and password.
Therefore,just input them inside the prompt and continue.
Target C drive will be on your screen.
In
order to prevent from this attack,close down port that you do not want
to use such as Port 135,Port 136,Port 137,Port 138 and Port 139.
©2011, copyright BLACK BURN
with 2000 server onlyy
ReplyDeletegreate work ............very informative blig post....................................complete blog post................................now staart hack
ReplyDelete