Enter the PCs and see the shared folders of other computers

After dedicating an article to the Logmein and Teamviewer programs useful for connecting and controlling a computer remotely (for example, the home computer from the office), and after seeing how to control other computers on the network and how to connect and use a PC remotely now let's see how to enter and enter another computer whose owner is not aware of it .
The problem of being vulnerable to external attacks does not depend so much on the skill of a possible hacker, it seems very unlikely that an expert hacker will waste time forcing the entry on the computer of a normal internet browser.
Instead, almost always, those who enter external computers are normal people who "try" and, using programs or small tools available also for free on the internet, they launch a scan of their subnet, to see if there is any computer connected without protection.
A subnet or subnet is made up of computers connected to the same router. The router allows PCs to go out on the Internet and "routes" data packets from one PC to another. To understand the concept of subnet, you can think of an office whose computers are connected to each other and which go out on the internet with the same IP address, via the same router or gateway. The same thing happens at home with some providers such as Fastweb.
In another article, the guide to create a corporate network at home or in the office and to share folders and other resources.
In another article I described the best free programs to scan the network, such as, for example, Network Scanner.
These programs check whether it is possible to enter a PC through the Telnet service, NetBios, Snmp, FTP or it explores resources on shared folders.
The Network Scanner program is very convenient because it does not require installation and can be carried around by copying it onto a USB stick and using it on PCs so as not to be noticed. The main function is to see which computers are turned on and connected to the network in a subnet by doing the so-called "ping", in addition it scans the TCP ports and checks the resources that may be shared by that computer and therefore accessible without needing to know any administrator password . Finally they list all the details available for each computer and therefore mac address, computer name, workgroup name, name of the user who is using it, and, if that PC has activated the snmp service, a lot of information on the hardware and software installed for a whole overview on that pc.
To do a search on the files of a lan network as if it were your own PC, you can use the Lan Search Pro program of which there is also a portable version and which becomes very useful for searching among the computers on the network and their shared folders.
The program that checks and shows the shared and visible folders of the computers connected in a network is Find Shared Folders
The range of IP addresses to be fed to these programs is formed in this way:
START -> Network connections -> Show all connections -> Right click on the active connection with written connected -> Status -> Support -> Details
The IP address is written in Details, for example 192.168.0.5, the Gateway, for example 192.168.0.1.
The fact that the first three series of numbers is identical indicates a subnet consisting of 255 (from 1 to 255) possible addresses that are attached to the same Router or Gateway and therefore can freely exchange data unless on a computer it is present a firewall that isolates it from the subnet. If there is no firewall, the computer is at high risk of intrusion into the subnet. These IP addresses are internal, i.e. these computers do not come out on the internet with the address 192.168.XX.XX but with the same address that is assigned by the internet service provider and which coincides with the external external IP of the router.
On another article there are the programs to set a static and fixed ip with a click, memorizing and changing them easily.
Out of that subnet then, to enter one of these PCs, you have to enter a wifi network and capture network packets to spy on what you do on the internet .
Subsequently, you could even bypass the router password if the default password is left, it is known for all Routers on the market.
I was very simplistic to avoid non-intuitive and not easily understandable concepts, the important thing is that the reader knows the risks of shared folders, not having a firewall and how easy it is to get into a PC.
For those who want to try to scan the network and "spy" on the computers of others, it must be emphasized that there is nothing illegal in looking at those who leave files and folders not password protected and even shared; it is illegal to try to force passwords and routers.
For those who are curious and want to know more about networks, IP addresses, gateways, routers, subnets etc. etc. I report this excellent guide to networks.

Leave Your Comment

Please enter your comment!
Please enter your name here