In the invasion, many times will use Telent to log in, but if the server launches Telnet service,
The land will be recorded, although there can be programs can clear those records, but must have admin privileges
Therefore, if you first invading the password, but also can't get ADM after the invasion is unsuccessful or successful.
If IN permissions, then you can't clear those records. Failure to simply talk about several ways to hide your identity:
1. Use the SOCKS agent, the Telnet program comes with it under the window does not support the SOCKS agent, want to make the SOCKS agent
To pass through other programs, such as SockCap32, E-Border Client, etc., other Telnet clients, for example
Netterm is directly supporting the SOCKS agent, but you can't know if the proxy server will host your
If it is a malicious agent, you will get the username and password you entered from the record, and
If there is a record, it is not necessary to be safe. Wingate can also be used as a springboard, but it is not very convenient.
2. Establish a springboard on broiler, which is more secure. The traditional method is to add an admin privilege on broiler.
Account, then start the Telnet service, first Telnet first telnet, then you want to pass the net chicken Telnet
The invasive server, clear the Telnet log on the broiler after the invasion.
Nowadays, there are several other methods, usually perform a shell program on broiler, this app is executed
After the end of the broiler, open a port to let you telnet, this method is the benefit of it is not a clear log, unless it is defense.
The firewall records your connection, otherwise it will not be discovered. NC (full name Netcat), NCX99 in these procedures (
Every time you use it once), ICMD (you can customize port and password, recommended), Drat (this is a Trojan, and
It's very difficult to clear, insert the code into the shell process, not recommended), Tini (very small Trojan, only 3K, but
Killed, not very safe), WINSHELL (domestic procedure, but not in Chinese NT or 2000, program 7
K size, but because I can't use it in Chinese window, I don't like it very much), Leapfrog (as old procedure, compression
There are more than 40 k, which can customize the port, and can limit the IP of that segment to allow connections, for example your IP is 61.127.
.189.89, in general, the top three IP will not change, you can set the IP segment that allows the connection to be 61.1
27.189. *, This only can be connected to the IP of this paragraph can be connected, I like the favorite or it can be in all WIN
DOWS is executed, while the above programs are in addition to Trojans and NC, Winshell, ICMD, NCX99 can't be in Win95.
Or 98 is executed, but now use WIN98 users still on users who use 2000 or NT), Snake Agents
Springboard (SOCK server-side program developed by Chinese, executing on broiler, but must have admin "
The moving, only can be performed at 2000 or NT, and the Chinese window is not available).
Summary: It is not very safe to use the Socks agent or Wingate. It is also safe to use Telnet service on broiler.
(You have to remember the clearing date), but many servers do not open Telnet services. Use some shell programs or
Trojans are very convenient and safe. In those shell programs and Trojans, Winshell and Snake proxy feeders are also
Nice, but very unfortunately there is a restriction (the procedures developed by the Chinese), NCX99, ICMD, NC is a good choice, NC has a lot of functions, as for the two Trojans, Drat is too dangerous. Can cause the broiler
If you can't run normally, TiNi will not load in self-start. Although Leapfrog is larger than Winshell or Snake
But it is still worth trying, and Leapfrog may spare the firewall because many firewalls only limit some ends.
The mouth can be used, the above procedures described above make the ports, such as Winshell, Snake, ICMD, and NCs can customize the port, but
If the firewall only allows 80 ports, the above program is tied to the 80 port if you turn yourself, because the server opens
The 80-port is generally WWW service. If you bring the above program to 80 port, you will definitely generate an error.
But Leapfrog did not have this problem.
Sore with me Linux command
Although Linux is free, it is indeed a very excellent operating system, which has an MS-Windows.
Relying on, stable, fast, etc., and has a wealth of powerful features based on UNIX version improvement. Below, as a
Typical DOS and Windows users, let us learn some of Linux some major orders, I hope everyone can do it.
Enter the world of Linux.
First, start
Linux starts the operation process and DOS (despite this, but as the operating system itself, Linux is started and
The work taken when exiting is much more than DOS), or by pressing the Ctrl Alt Del three key for heat start. Do not
The same is that Linux is started to the end, you need to log in. Below is a typical login process:
......
Redhat Linux Release 5.1
KERNEL 2.0.32 on AN i686
Login:
After you type: root, the computer displays the input order (Password :), enter your password (if the first time
Start, you can be in the password you entered during installation. When a computer appears a "#" prompt, indicate
You log in success!
[root @ localhost root] #_ linux prompt
C: /> _ DOS prompt
Second, some orders commonly used:
1. Display the file directory command ls (DOS is DIR)
Use the ls command in Linux (of course, you can still use the dir command, just here)
The parameters are different). For example: #LS root mnt boot dev bin usr xiong tmp etc games
It seems that it seems simple (it is equivalent to "DIR / W" in DOS), but you will find some difficulties you see, even
What are the directorys are not clear, what is the executable file? Don't close, please enter: #ls -f
Root / mnt / boot / dev / bin / usr / xiong * TMP / etc / games / readme
Look at it, bring * for executable (equivalent to Exe and COM files in DOS), with / for subdirectories,
It is a general purpose file. In addition, we can use the LS -L display of the details of the file directory (equivalent to DIR life in DOS)
make). Thousands of attention are case sensitive !! Rustus, such as ls -f; ls, etc. are wrong. In addition, there are many parameters in the LS command, you can use Man LS or LS - Help to learn more.
2. Change the current directory command CD (DOS CD)
In DOS, we can use C: /> CD / MNT / CDROM or CD / MNT / CDROM
C: / mnt / cdrom> cd .. or CD .. or CD ..
C: / MNT> CD / or C: / MNT> CD /
In Linux, CD / MNT / CDROM, the case of the directory name must be the same, and the CD must be available after the CD.
grid.
PWD Shows the current directory
Cd .. must be lowercase, there must be spaces
CD / total catalog /, CD and / must have spaces
3. Create a subdirectory MKDir (MD or MKDIR under DOS)
Only MKDIR can be used in Linux, with relative paths and absolute paths, compare:
C: /> MD Xiong or MD / Xiong or MD / Xiong DOS system
[root @ localhost /] # mkdir xiong or MKDIR / XionG Linux system
4. Delete subdirectory command RMDir (DOS is RD)
Use the RMDIR command in Linux to delete subdireuses, for example:
RMDIR / MNT / CDROM is equivalent to RD / MNT / CDROM
Note: Like DOS, the subdites you want to delete must be empty, and must be deleted in the previous directory.
The next subdirectory.
5. Delete the file command RM (DOS is DEL or EARSE)
Remove files with RM commands in Linux, for example:
Rm /ucdos.bat is equivalent to del /ucdos.bat
6. File Renname Command MV (REN or RENAME under DOS) Use the mv command in Linux to rename, for example:
MV / MNT / FLOPPY P is equivalent to REN / MNT / FLOPPY P
Description: In addition to the file change in Linux, there is a function of file mobile, please see example:
MV / MNT / FLOPPY / BIN is equivalent to command MOVE / MNT / FLOPPY / BIN in DOS
7. Document copy command CP (DOS is COPY)
File replication with the CP command in Linux, Example:
CP / UCDOS / * / FOX is equivalent to copy /ucdos/*.* / fox
Note: *. * In Linux is replaced in linux.
8. Get the help information command Man (DOS is HELP)
Use the man command in Linux to get help information, for example:
MAN LS is equivalent to Help Dir
LS --HELP is equivalent to DIR /
9. Show the contents of the file Less (Type under DOS)
Use the Less command in Linux to display the work, for example, we want to display MWM.lx under the Man1 subdirectory
The content, just enter: [root @ localhost man1] #less mwm.lx. In Linux, we also
You can use another command "more" to display file content, for example: more mwm.lx. You will see that these two lives
Let the order, in fact, the ability of the Less command is better than more, you can explore yourself. In Linux, there is also a command for reading the reading files in two DOS. They are the head and tail commands, which are used to display text.
Part of the head and rear part of the part. Using the format: Head (tail) [m], when default N, 10 lines, examples
Such as:
Head /usr/man/mwm.lx display the contents of the top 10 lines of the file MWM.LX
Head 15 /usr/man/mwm.lx Displays the contents of the first 15 lines of the file MWM.LX
Tail 17 /usr/man/mwm.lx Displays the contents of 17 lines after the file MWM.LX
10. Redirect and pipeline
Everyone knows that in DOS, we can easily carry out some special operations by redirecting and pipeline, such as:
Dir> Direct places the current directory into the file direct; Type Readme >> Direct, the content of the file readme
Added to the document Direct; as: type readme.txt | more, pagination display text file readme.txt
Rong. Redflation in Linux is almost the same as the operations in DOS, and two examples should be in Linux.
To: LS> Direct; Less Readme.txt | More (Note: In fact, more and less command in Linux
There is a paging function).
11. Shell: Command Interpreter (Command)
In the DOS system, most users are using a command intermand.com command interpreter. Of course, you
Displays some of the heads and rear parts of the file. Use the format: Head (tail) [m]
The default N is also available for Dosshell after Norton or DOS4.0. In Linux, there are several shells. common
From: ASH, BASH, KSH, TCSH, ZSH, etc., shell = / bin / bash from the above environment variables can see you
Which shell is used, it is located. The default computer is generally BASH.
The above Linux commands are just similar to the DOS function, but as a multi-user, multitasking
Operating system, its powerful features are far more than this. I hope more people use this excellent operating system, I believe you.
It will not regret it.