Resultados 1 al 3 de 3

como configurar win para atake a victima

  1. #1 como configurar win para atake a victima 
    Iniciado
    Fecha de ingreso
    Feb 2002
    Ubicación
    Sevilla
    Mensajes
    18
    Descargas
    0
    Uploads
    0
    ke pasos hay ke realizar para configurar mi makina para eso y cuales son los pasos a seguir despues de hacer un netstat -a y saber la ip de la victima para realizar una extension en mi makina de su disco duro.
    graxiassssssssss
    Citar  
     

  2. #2  
    Moderador HH
    Fecha de ingreso
    Feb 2002
    Ubicación
    México
    Mensajes
    1.156
    Descargas
    4
    Uploads
    0
    Debes tener el puerto 139 abierto, es decir, debes tener la opcion de compartir recursos, para esto te vas al panel de control, le das doble clic en red y escoges la opción de compartir recursos.

    Después de que tienes la ip y el nombre de la vícitma debes configurar el archivo c:\windows\system32\lmhosts y escribes:
    NOMBREMAQUINA IP con esto puedes entrar al equipo remoto. si quieres más detalles aquí pongo un tutorial, aunque está en ingles, por si alguien puede traducirlo.

    # Copyright (c) 1998 Microsoft Corp.
    #
    # This is a sample LMHOSTS file used by the Microsoft Wins Client (NetBios
    # over TCP/IP) stack for Windows98
    #
    # This file contains the mappings of IP addresses to NT computernames
    # (NetBIOS) names. Each entry should be kept on an individual line.
    # The IP address should be placed in the first column followed by the
    # corresponding computername. The address and the comptername
    # should be separated by at least one space or tab. The "#" character
    # is generally used to denote the start of a comment (see the exceptions
    # below).
    #
    # This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
    # files and offers the following extensions:
    #
    # #PRE
    # #DOM:<domain>
    # #INCLUDE <filename>
    # #BEGIN_ALTERNATE
    # #END_ALTERNATE
    # \0xnn (non-printing character support)
    #
    # Following any entry in the file with the characters "#PRE" will cause
    # the entry to be preloaded into the name cache. By default, entries are
    # not preloaded, but are parsed only after dynamic name resolution fails.
    #
    # Following an entry with the "#DOM:<domain>" tag will associate the
    # entry with the domain specified by <domain>. This affects how the
    # browser and logon services behave in TCP/IP environments. To preload
    # the host name associated with #DOM entry, it is necessary to also add a
    # #PRE to the line. The <domain> is always preloaded although it will not
    # be shown when the name cache is viewed.
    #
    # Specifying "#INCLUDE <filename>" will force the RFC NetBIOS (NBT)
    # software to seek the specified <filename> and parse it as if it were
    # local. <filename> is generally a UNC-based name, allowing a
    # centralized lmhosts file to be maintained on a server.
    # It is ALWAYS necessary to provide a mapping for the IP address of the
    # server prior to the #INCLUDE. This mapping must use the #PRE directive.
    # In addtion the share "public" in the example below must be in the
    # LanManServer list of "NullSessionShares" in order for client machines to
    # be able to read the lmhosts file successfully. This key is under
    # \machine\system\currentcontrolset\services\lanmans erver\parameters\nullsessionshares
    # in the registry. Simply add "public" to the list found there.
    #
    # The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
    # statements to be grouped together. Any single successful include
    # will cause the group to succeed.
    #
    # Finally, non-printing characters can be embedded in mappings by
    # first surrounding the NetBIOS name in quotations, then using the
    # \0xnn notation to specify a hex value for a non-printing character.
    #
    # The following example illustrates all of these extensions:
    #
    # 102.54.94.97 rhino #PRE #DOM:networking #net group's DC
    # 102.54.94.102 "appname \0x14" #special app server
    # 102.54.94.123 popular #PRE #source server
    # 102.54.94.117 localsrv #PRE #needed for the include
    #
    # #BEGIN_ALTERNATE
    # #INCLUDE \\localsrv\public\lmhosts
    # #INCLUDE \\rhino\public\lmhosts
    # #END_ALTERNATE
    #
    # In the above example, the "appname" server contains a special
    # character in its name, the "popular" and "localsrv" server names are
    # preloaded, and the "rhino" server name is specified so it can be used
    # to later #INCLUDE a centrally maintained lmhosts file if the "localsrv"
    # system is unavailable.
    #
    # Note that the whole file is parsed including comments on each lookup,
    # so keeping the number of comments to a minimum will improve performance.
    # Therefore it is not advisable to simply add lmhosts file entries onto the
    # end of this file.
    Mientras el mundo permanezca no acabarán la fama y la gloria de México-Tenochtitlan
    Citar  
     

  3. #3  
    Iniciado
    Fecha de ingreso
    Dec 2001
    Mensajes
    28
    Descargas
    0
    Uploads
    0
    te dejo esta direccion que esta en castellano y lo explica muy bien , por cierto si no te funciona con el nombre de la makina pon su ip y si no tiene contraseña , posss ya estaras deentro, suerteeee
    http://www.hackingparanovatos.com/



    allll atakerrlllll

    http://members.fortunecity.es/kikesss
    Citar  
     

Temas similares

  1. Respuestas: 4
    Último mensaje: 08-05-2010, 18:45
  2. ¿Como configurar etter.conf para ssl?
    Por xl8 en el foro LINUX - MAC - OTROS
    Respuestas: 7
    Último mensaje: 30-06-2009, 12:29
  3. Programa para desactivar Antivirus de la victima
    Por viruka90 en el foro GENERAL
    Respuestas: 5
    Último mensaje: 16-09-2008, 19:35
  4. Respuestas: 3
    Último mensaje: 31-10-2006, 11:22
  5. Respuestas: 0
    Último mensaje: 14-03-2002, 01:01

Marcadores

Marcadores