When I penetrated a certain site this evening, I met my own difficulties, so I found it everywhere. I saw http://eviloctal.bbnl.org/forum/read.php?tid=8157&fpage=1 this article. Hehe I originally It also encounters this situation. However. Or solve itself, but the method used is different from the method used in Intruder .. I used sniffing. But the safety awareness of the host of the host I have invaded. So He has changed the user name of the administrator password of Serv-U of local listening. I used UltraEdit to find a half-day. Then I passed servudaemon.exe to a few friends. They are too troublesome. So I had to come. In fact, I thought I had a sniffing method. But because of my lazy reason. So I didn't want to manage it. Later, I felt that I put down this unfortunately. Just study hard, because of my previous research server Safety settings. So a pile of things. Of course, it also includes serv-u. Install. I will cover the machine's servudaemon.exe's servudaemon.exe to penetrate. If everyone is afraid, what will happen? It is best to choose the SERV-U of the SERV-U of the host of the target. TIPS: If there are people who study Serv-U will find it. FTPSERVER in the Loading Serv-U is set, even if it is lost, it is the same. Tip Enter your password. Then submit the user with your password, and then verify. The password of the Serv-U administrator is servudaemon.exe, then we will manage it with the already replaced servudaemon.exe. It is definitely to connect to this machine 43958 port, then submit the user password. As long as we get it at this time. So you can. See you will not look at it :) Continue ~! Run Serv-U, I saw a green in the taskbar. U.In this before this. First open WSOCK EXPERT, select Servudaemon.exe, then double-click the green u. That is, Serv-U, then pop up a window, what information is forgotten, but there is a modified serv- u 's administrator's account. Then you look at WSOCK EXPERT, the data obtained in it has a modified account password. It is good to do it! XIAOLU modified the EXP of the serv-u local upgrade authority. Oh, We also modified. Open the source code of the EXP. Find localadministrator and #l@l@lk; 0 @p, then replace it with your account and password you sniff. Just find a compiler to compile it. Things! This can get permissions. Full text After XIAOLU modified Serv-U EXP download address: http://666w.cn/soft/serv-u.c At this time, Thank Yoyo's concern for me. Thank you!