It is not possible for me to give acknowledgment to such tutorials and hence there must be no copyright or legal issues regarding this tutorial. Dear reader I have written this tutorial keeping in mind that readers having only the basic knowledge will also be able to know how hackers hack using NetBIOS.
I strongly oppose hacking but not ethical hacking. An ethical hacker is one that hacks computer networks not for anti social reasons but to let the network administrators know about the security holes so that they can prevent their computers from hacking.
If you want to contact me please send me a mail to ethicalhackers yahoo. After clicking on the icon you would have seen the names of the computer. Do you know what exactly happens when you click on Network Neighborhood? Your computer tries to get the names of the computers attached to the network with by issuing command to NetBIOS.
NetBIOS gives the name of the computers that have been registered. These Include-. Like any other service it also works on a port. It has been assigned a port number To use this command click on the start button then select RUN If you have launched the command prompt you will get. A typical example. Name Number Type Usage. Please note that we have used our ip address to be This ip address is called as "Loop Back" ip address because this ip address always refers to the computer you are using.
This example is self explanatory. We need not go in details. We need to know about the Name and Number. You may see some additional names in your case.
I am using it only as an example. Please don't hack this computer. If you want to get to know more about the ip address and ports click here. Press the shift key 5 times, rapidly, when you're in the username screen. In the Sticky Keys window, click Yes. For example: net user administrator Yes, it is possible, but you have to do it on the start screen.
Yes No. Not Helpful 4 Helpful Stephan Brun. Using this method, your files should be safe. The first method just gets a command prompt with admin privileges; nothing else is touched. The second method changes a file on the hard disk. Normally, you will want to restore that for normal login screen functionality, so the seth. Not Helpful 2 Helpful Not Helpful 12 Helpful Not Helpful 15 Helpful 6. Include your email address to get a message when this question is answered.
Submit a Tip All tip submissions are carefully reviewed before being published. Don't be an idiot and mess up someone else's computer. Only do anything like this if you need access to the root of Windows.
It was written for learning only. Also, don't try anything unless you know something about DOS. Helpful 1 Not Helpful 0.
It is not recommended to attempt this at school or at a library. The consequences could be negative for your convenience, and legal trouble could also ensue. Again, it is not recommended to attempt this at school or at a library unless you really know what you are doing and how to get out of it. Helpful 0 Not Helpful 0. Doing this stuff on a computer other than yours is illegal , so don't do it on someone else, unless you have been given the permission to do so.
You Might Also Like How to. Despite Microsoft's positioning of the upgrade, consumers have already run into problems with Windows 98 when technical sophistication is required. Many PC owners complained of upgrade problems and troubles locating and installing the necessary drivers to get peripheral devices to work with Windows Be respectful, keep it civil and stay on topic. We delete comments that violate our policy , which we encourage you to read. Discussion threads can be closed at any time at our discretion.
Windows 98 vulnerable to hacking The shared-file feature of Windows 98, which allows access to files without passwords, may open a user's computers to hacks. Discuss: Windows 98 vulnerable to hacking.
0コメント