Hidden your true identity to invade!

zhaozj2021-02-16  109

In the invasion, many times will use Telent to log in, but if the server launches Telnet service,

The land will be recorded, although there can be programs can clear those records, but must have admin privileges

Therefore, if you first invading the password, but also can't get ADM after the invasion is unsuccessful or successful.

If IN permissions, then you can't clear those records. Failure to simply talk about several ways to hide your identity:

1. Use the SOCKS agent, the Telnet program comes with it under the window does not support the SOCKS agent, want to make the SOCKS agent

To pass through other programs, such as SockCap32, E-Border Client, etc., other Telnet clients, for example

Netterm is directly supporting the SOCKS agent, but you can't know if the proxy server will host your

If it is a malicious agent, you will get the username and password you entered from the record, and

If there is a record, it is not necessary to be safe. Wingate can also be used as a springboard, but it is not very convenient.

2. Establish a springboard on broiler, which is more secure. The traditional method is to add an admin privilege on broiler.

Account, then start the Telnet service, first Telnet first telnet, then you want to pass the net chicken Telnet

The invasive server, clear the Telnet log on the broiler after the invasion.

Nowadays, there are several other methods, usually perform a shell program on broiler, this app is executed

After the end of the broiler, open a port to let you telnet, this method is the benefit of it is not a clear log, unless it is defense.

The firewall records your connection, otherwise it will not be discovered. NC (full name Netcat), NCX99 in these procedures (

Every time you use it once), ICMD (you can customize port and password, recommended), Drat (this is a Trojan, and

It's very difficult to clear, insert the code into the shell process, not recommended), Tini (very small Trojan, only 3K, but

Killed, not very safe), WINSHELL (domestic procedure, but not in Chinese NT or 2000, program 7

K size, but because I can't use it in Chinese window, I don't like it very much), Leapfrog (as old procedure, compression

There are more than 40 k, which can customize the port, and can limit the IP of that segment to allow connections, for example your IP is 61.127.

.189.89, in general, the top three IP will not change, you can set the IP segment that allows the connection to be 61.1

27.189. *, This only can be connected to the IP of this paragraph can be connected, I like the favorite or it can be in all WIN

DOWS is executed, while the above programs are in addition to Trojans and NC, Winshell, ICMD, NCX99 can't be in Win95.

Or 98 is executed, but now use WIN98 users still on users who use 2000 or NT), Snake Agents

Springboard (SOCK server-side program developed by Chinese, executing on broiler, but must have admin "

The moving, only can be performed at 2000 or NT, and the Chinese window is not available).

Summary: It is not very safe to use the Socks agent or Wingate. It is also safe to use Telnet service on broiler.

(You have to remember the clearing date), but many servers do not open Telnet services. Use some shell programs or

Trojans are very convenient and safe. In those shell programs and Trojans, Winshell and Snake proxy feeders are also

Nice, but very unfortunately there is a restriction (the procedures developed by the Chinese), NCX99, ICMD, NC is a good choice, NC has a lot of functions, as for the two Trojans, Drat is too dangerous. Can cause the broiler

If you can't run normally, TiNi will not load in self-start. Although Leapfrog is larger than Winshell or Snake

But it is still worth trying, and Leapfrog may spare the firewall because many firewalls only limit some ends.

The mouth can be used, the above procedures described above make the ports, such as Winshell, Snake, ICMD, and NCs can customize the port, but

If the firewall only allows 80 ports, the above program is tied to the 80 port if you turn yourself, because the server opens

The 80-port is generally WWW service. If you bring the above program to 80 port, you will definitely generate an error.

But Leapfrog did not have this problem.

Sore with me Linux command

Although Linux is free, it is indeed a very excellent operating system, which has an MS-Windows.

Relying on, stable, fast, etc., and has a wealth of powerful features based on UNIX version improvement. Below, as a

Typical DOS and Windows users, let us learn some of Linux some major orders, I hope everyone can do it.

Enter the world of Linux.

First, start

Linux starts the operation process and DOS (despite this, but as the operating system itself, Linux is started and

The work taken when exiting is much more than DOS), or by pressing the Ctrl Alt Del three key for heat start. Do not

The same is that Linux is started to the end, you need to log in. Below is a typical login process:

......

Redhat Linux Release 5.1

KERNEL 2.0.32 on AN i686

Login:

After you type: root, the computer displays the input order (Password :), enter your password (if the first time

Start, you can be in the password you entered during installation. When a computer appears a "#" prompt, indicate

You log in success!

[root @ localhost root] #_ linux prompt

C: /> _ DOS prompt

Second, some orders commonly used:

1. Display the file directory command ls (DOS is DIR)

Use the ls command in Linux (of course, you can still use the dir command, just here)

The parameters are different). For example: #LS root mnt boot dev bin usr xiong tmp etc games

It seems that it seems simple (it is equivalent to "DIR / W" in DOS), but you will find some difficulties you see, even

What are the directorys are not clear, what is the executable file? Don't close, please enter: #ls -f

Root / mnt / boot / dev / bin / usr / xiong * TMP / etc / games / readme

Look at it, bring * for executable (equivalent to Exe and COM files in DOS), with / for subdirectories,

It is a general purpose file. In addition, we can use the LS -L display of the details of the file directory (equivalent to DIR life in DOS)

make). Thousands of attention are case sensitive !! Rustus, such as ls -f; ls, etc. are wrong. In addition, there are many parameters in the LS command, you can use Man LS or LS - Help to learn more.

2. Change the current directory command CD (DOS CD)

In DOS, we can use C: /> CD / MNT / CDROM or CD / MNT / CDROM

C: / mnt / cdrom> cd .. or CD .. or CD ..

C: / MNT> CD / or C: / MNT> CD /

In Linux, CD / MNT / CDROM, the case of the directory name must be the same, and the CD must be available after the CD.

grid.

PWD Shows the current directory

Cd .. must be lowercase, there must be spaces

CD / total catalog /, CD and / must have spaces

3. Create a subdirectory MKDir (MD or MKDIR under DOS)

Only MKDIR can be used in Linux, with relative paths and absolute paths, compare:

C: /> MD Xiong or MD / Xiong or MD / Xiong DOS system

[root @ localhost /] # mkdir xiong or MKDIR / XionG Linux system

4. Delete subdirectory command RMDir (DOS is RD)

Use the RMDIR command in Linux to delete subdireuses, for example:

RMDIR / MNT / CDROM is equivalent to RD / MNT / CDROM

Note: Like DOS, the subdites you want to delete must be empty, and must be deleted in the previous directory.

The next subdirectory.

5. Delete the file command RM (DOS is DEL or EARSE)

Remove files with RM commands in Linux, for example:

Rm /ucdos.bat is equivalent to del /ucdos.bat

6. File Renname Command MV (REN or RENAME under DOS) Use the mv command in Linux to rename, for example:

MV / MNT / FLOPPY P is equivalent to REN / MNT / FLOPPY P

Description: In addition to the file change in Linux, there is a function of file mobile, please see example:

MV / MNT / FLOPPY / BIN is equivalent to command MOVE / MNT / FLOPPY / BIN in DOS

7. Document copy command CP (DOS is COPY)

File replication with the CP command in Linux, Example:

CP / UCDOS / * / FOX is equivalent to copy /ucdos/*.* / fox

Note: *. * In Linux is replaced in linux.

8. Get the help information command Man (DOS is HELP)

Use the man command in Linux to get help information, for example:

MAN LS is equivalent to Help Dir

LS --HELP is equivalent to DIR /

9. Show the contents of the file Less (Type under DOS)

Use the Less command in Linux to display the work, for example, we want to display MWM.lx under the Man1 subdirectory

The content, just enter: [root @ localhost man1] #less mwm.lx. In Linux, we also

You can use another command "more" to display file content, for example: more mwm.lx. You will see that these two lives

Let the order, in fact, the ability of the Less command is better than more, you can explore yourself. In Linux, there is also a command for reading the reading files in two DOS. They are the head and tail commands, which are used to display text.

Part of the head and rear part of the part. Using the format: Head (tail) [m], when default N, 10 lines, examples

Such as:

Head /usr/man/mwm.lx display the contents of the top 10 lines of the file MWM.LX

Head 15 /usr/man/mwm.lx Displays the contents of the first 15 lines of the file MWM.LX

Tail 17 /usr/man/mwm.lx Displays the contents of 17 lines after the file MWM.LX

10. Redirect and pipeline

Everyone knows that in DOS, we can easily carry out some special operations by redirecting and pipeline, such as:

Dir> Direct places the current directory into the file direct; Type Readme >> Direct, the content of the file readme

Added to the document Direct; as: type readme.txt | more, pagination display text file readme.txt

Rong. Redflation in Linux is almost the same as the operations in DOS, and two examples should be in Linux.

To: LS> Direct; Less Readme.txt | More (Note: In fact, more and less command in Linux

There is a paging function).

11. Shell: Command Interpreter (Command)

In the DOS system, most users are using a command intermand.com command interpreter. Of course, you

Displays some of the heads and rear parts of the file. Use the format: Head (tail) [m]

The default N is also available for Dosshell after Norton or DOS4.0. In Linux, there are several shells. common

From: ASH, BASH, KSH, TCSH, ZSH, etc., shell = / bin / bash from the above environment variables can see you

Which shell is used, it is located. The default computer is generally BASH.

The above Linux commands are just similar to the DOS function, but as a multi-user, multitasking

Operating system, its powerful features are far more than this. I hope more people use this excellent operating system, I believe you.

It will not regret it.

转载请注明原文地址:https://www.9cbs.com/read-14120.html

New Post(0)