Want to be a hacker? !

xiaoxiao2021-03-06  38

Chapter 1 ------ About searching software

Commonly used software:

Black and white house:

http://www.play8.net/

Huajun software

http://www.newhua.com/ (Select speed fast image according to physical location)

China download

Http://download.com.cn/ (most software can be found using the lookup function)

East online

http://www.tjdl.net/softdown/ (Nice Software Download Station, similar to Huajun)

Century download

http://www.21sx.com/ (is also a good download station)

Safety software:

Black and white house:

http://www.play8.net/index2.htm

Security focus

http://www.xfocus.net/tool.php

Security information

http://www.aurorasafe.com/list.asp

Every day security

http://www.ttian.net/download/list.php

Net sniff download

http://netsill.com/download/default.asp

Gray trajectory

http://www.sandflee.net/down/list.asp

Eagle download

Http://211.155.27.12/~technic/down/

(Some large classic security software download, but sometimes it will not go)

Find a proxy here:

Agent usage method

http://extend.hk.hi.cn/~sunbird/freeproxy_why.html

(Introduction to various agent usage)

Proxy server address

http://www.salala.com/proxy_index.htm

(Most of the HTTP proxy)

Proxy server address

http://www.emaga.net/8341/myann

(Daily updated, most of the SOCKS agent, both QQ agents)

The registration code is here:

Sixth space

http://www.sixthroom.com/down/qt/ser.rar (Registration Code Daquan Download)

Registration code search

http://www.netpaste.com/code/

Sight monthly registration code

http://www.guyue.com/key/

Chapter 2 ------ About the invasion

Brief description:

There are often posts say: "I am China Trojan, what should I do?" "I was attacked." I have a problem with my windows. Is it invaded? "Wait." If you suspect that the system is invaded, please first look at the log's record or what changes, then you should see the suspicious process (Win98 needs to use related tools), registry launch, service, open port, then Update the virus library, anti-virus. The premise is that you have to have a certain computer common sense and more understanding your system, it can be normal or not. If you don't have a lot of computers, it's hard to help you in the forum. In fact, like a virus in reality, it should be prevention. Anti-virus software and network firewall can resist most danger, and the improvement of their own safety knowledge is the most fundamental guarantee. The latest virus-related knowledge can be found on the homepage of anti-virus software companies. In addition, the system is not normal or caused by operating errors. It is not a "computer zero point", so there is a problem with system repair, please don't mention it in the forum.

Related tools:

Active Ports monitors your computer's port and makes it properly.

http://www.sixthroom.com/down/aq/cn_aports.rar

Windows Optimization Master 5.1 Its process management features are good. It is also the best system optimization software. http://www.sixthroom.com/down/aq/wom.rar

Windows Benchmark Security Analyzer 1.0 (Special Recommendation, Details See Download Notes)

http://www.sixthroom.com/down/admin/aq/mbsasetup.msi

FPORT-2.0 View port association (applied to 9x / me)

Http://www.sixthroom.com/down/admin/aq/fport.zip

Mport is more winning more than fport

http://www.sixthroom.com/down/admin/aq/mport.zip

KV3000 Jiangmin anti-virus king (official version key disc)

http://www.kxweb.net/down/down.asp?downid=1&id=14

Jinshan drug tyrant 2003 official version

http://www.kxweb.net/down/down.asp?downid=1&id=11

Relevant information:

Black and White House Document Center:

http://www.play8.net/cgi-bin/news/Article/List.cgi

104 types of trees

http://asp2.6to23.com/ebug88/net/Article/net004.htm

Clear damage of malicious webpage

http://assistant.3721.com/safe.htm

2000 system process list

Http://sinbad.zhoubin.com/read.html?board=win&num=73

Trojan detection, clearance and its prevention

http://sky.net.cn/main/view.php?cid=170

Blue Shield safety test

http://www.boedon.com/boedonserver.asp

Chapter 3 ------ Basic Knowledge and Intrusion Steps

Brief description:

Computers and network knowledge can be based on the foundation of hackers, at least you must first understand them to see the following article. After reading this section, you just think of the door, the road is still growing. Here I will say a few words about the invasion step, give novices to a guidance. The so-called invasion can be understood as unauthorized access. Since it is unauthorized, it is necessary to use some unconventional means, which is usually used to use vulnerabilities.

Basic knowledge website:

http://tech.163.com/tm/010213/010213_14563.html

http://tech.163.com/tm/010213/010213_14564.html

http://tech.163.com/tm/010214/010214_14632.html

http://tech.163.com/tm/010214/010214_14634.html

http://tech.163.com/tm/010214/010214_14638.html

First, you must first discover it first by using the vulnerability. Port scans and vulnerability scans are "knocking on the door". A general scan can be made for a large number of targets, or a single target can also be scanned. Or both in both. When you are familiar with the vulnerability, you can understand the possible vulnerabilities of the target only through the port scan. This improves both efficiency and not easily recorded.

Simple use tutorial for several scanners:

http://www.chinesehack.org/file/show.asp?id=5614

Intrusion Technical Introduction - Target Detection:

http://www.sixthroom.com/ailan/f ... 2 & rootid = 279 & id = 279

Second, the problem after finding the vulnerability is a thousand words. This is one of the places where newbie wants to learn. Many things to rely on their own knowledge accumulation and the level of understanding of the system, not much here. Here are a few websites that provide vulnerabilities for your reference. Tianji Net

Http://www.myhard.com/76284138209935360/index.shtml

Green Alliance Technology

http://www.nsfocus.net/index.php?act=sec_bug

May security network

http://bgbbs.wwww70.cn4e.com/Article.asp?cat_id=2

China Information Security

http://www.chinafirst.org.cn/ruodian/advisory.php

Third, what is the purpose of using the vulnerability? It is the control of the other party, that is, it is a remote shell. The concept of shell is inherited from UNIX, refers to an interactive mode and interface with the core of the operating system. A typical example is Telnet. There are many ways to get the shell, such as Telnet, terminal service that comes with the system. Or provided by Trojans and tools such as Winshell, glaciers, and so on. The following article introduces two shell programming articles to everyone.

China software

http://www.9cbs.net/develop/Article/14/14219.shtm

Program Spring and Autumn

http://www.cbinews.com/developer/showcontent.php?rticleid=2193

Fourth, shell is the right to permissions. The highest permission - Administrator privilege is our goal. So sometimes there will be a problem with enhancement. Of course, this also uses a vulnerability. Here is a few articles.

Win2K promotion permission vulnerability

http://www.yesky.com/20010530/182273.shtml

Microsoft SQL Server WebTasks Permissions Lifting Vulnerability

Http://it.rising.com.cn/newsite/ ... 10 / 31-153502052.htm

Linux Kernel PTRACE Lift Vulnerability

Http://levinstorm.myetang.com/main/holes/unix/005.html

NT / 2000 method of upgrading permissions

Http://home.lufeng.neet/wolf/compute/luodong/2000tisheng.htm

IIS upgrade permission vulnerability

http://www.ddhome.net/hole/14.htm

5. With the shell, it is necessary to expand it, it is to further get a better shell. The command line to the graphic, the function is less. So I have "how to open 3389", "how to upload". In this introduction, I will introduce you to the most popular 3389. More articles please

Www.sixthroom.com.

Remotely open 3389 terminal service

http://www.sandflee.net/wawa/3389-1.htm

Create your 3389 broiler

http://www.sandflee.net/wawa/sz-3389.htm

Sixth, in order to control the goals next time, you need to keep the shell. It is a kind of "learning" to do a good back door. Clone account, burying wood horse, breaking the password of Administrator, and the means is different. Everyone is learning.

Forever back door

http://www.ttian.net/Article/show.php?id=259

Simple implementation of ping back door under win2000

Http://www.landun.org/wenzhang/images/xiaran/Article/154.html

Account clone

http://www.netxeyes.org/ca.exe

Account check

http://www.netxeyes.org/cca.exe

Violent crack LC4

Http://www.andyxu.net/bana/tools_2/lc4.rar Port Knowledge:

Related tools:

The scan port is the basic function of the scanner, and the tool is too much. Provide two to everyone, more referred to.

X-port.zip download

http://www.xfocus.net/download.php?id=327

PortReady download

http://dotpot.533.net/dpsoft/portready1.6.zip

Relevant information:

Port Scanning Introduction

Http://www.netscreen.com.cn/suml/zhishiyy/jingong/duankougj.htm0

System service and Trojan default port table

http://www.pttc.yn.cninfo.net/dtsy/nettech/netanquan/41250634.htm

Port Daquan

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 268 & id = 268

Commonly used default port lists and features Chinese annotations

http://www.sixthroom.com/ailan/f ... 2 & rootid = 267 & id = 267

Frequent port detailed and partial attack strategy

http://www.sixthroom.com/ailan/f ... 2 & rootid = 266 & id = 266

Relevant information:

How to become a hacker

Http://263.aka.org.cn/docs/hacker-howto_2001.html

Question

Http://bbs.online.sh.cn/eliteart ... 44fb3b6efa4377e48ae

TCP / IP foundation

http://www.linkwan.com/gb/routertech/netbase/tcpip.htm

Network attack and defense tutorial

http://www.netsill.com/wenzhang/list.asp?id=115

Network intrusion steps and ideas

http://www.iamguo.com/bh3/hackguide2.htm

Reject behind the black hand to spy the IPC $ vulnerability

Http://computer.szptt.net.cn/2002-04-27/nw2002042700109.shtml

Global IP allocation table

http://519519.vicp.net/lb5000//USR/3/3_11.txt

Hacker entry tutorial

http://www.pttc.yn.cninfo.net/dtsy/nettech/netanquan/43934529.htm

Rookie XXX passenger

Http://netsafe.ayinfo.ha.cn/sqxw/2002117172333.htm

Several popular invasion tools and explanations

Http://www.pttc.yn.cninfo.net/dtsy/nettech/netanquan/44188520.htm

Frequent port detailed and partial attack strategy

http://www.pttc.yn.cninfo.net/dtsy/nettech/netanquan/-90637.htm

Various levels of attacks

http://www.pttc.yn.cninfo.net/dtsy/nettech/netanquan/39825935.htm

Chapter 4 ------ About orders

Brief description:

WindowsNT / 2000 has a rich CMD available, and its role is also huge. It is worth learning to master her. The Windows2000 itself provides detailed command help. In the start menu - "Help you can search for" Windows 2000 Command Reference ". It is highly recommended that the novices take a closer look at it. Installing software such as IIS, there will be new commands, add /? Or -h parameters in the command line mode to view help, other built-in commands are of course possible. There is also something necessary to master some common DOS commands. Because Winsows do not have to develop, it is impossible to replace DOS, at least not now. The NET command is the most common network command, I want to make a hacker, but it is necessary to master. It is also necessary to master some Linux commands. I hope the following information will help everyone. Related Posts:

DOS under network related commands explain

http://www.jiejingwang.com/list.asp?id=521

Getting Started Network Command

http://www.jiejingwang.com/list.asp?id=520

Win2000 Command Complete Works

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 343 & id = 343

Detailed explanation of the cmd command under Windows XP

http://www.sixthroom.com/ailan/f ... 2 & rootid = 366 & id = 366

FTP command:

http://www.hotcy.org/chem/campous/Article/ftp.htm

Telnet Command Description:

http://www22.brinkster.com/lastknife/netbase/telnetORDER.HTM (the above address briefly introduces the telnet command,

http://www.sixthroom.com/ailan/f ... 2 & rootid = 277 & id = 277

NET command Basic User:

http://www.yy0730.com/1/1/1/wen/list.asp?id=12

TFTP command: Since the TFTP command is too simple, please use the "TFTP /?" to query it. Here is given a reference

Example:

Http://levinstorm.myetang.com/main/tutorials/hacking/006.html

Several common commands required for general intrusion:

http://www.yixindz.com/badschool/hacker/hack_commands.htm

Common network command for Linux

http://www.jiejingwang.com/list.asp?id=522

Chapter 5 ------ About Windows98

Brief description:

There are two kinds of such issues: What is the invasion of the Win98 system, and the other is in Win98 invading.

Since the network function of 98 is not perfect, the problem solving is far from "rich and multi-color" as 2000. 98 By default, there is no network service startup, and the well-known vulnerabilities are not perfect for the functional design of various services, so it is difficult to invade, that is, no vulnerabilities, it is difficult to invade anything that can be used. This is difficult to imagine. Sharing invasion, is the most common way of attack.

Relevant information:

Share invasion

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 269 & id = 269

Invasion Windows98 system

http://www.sixthroom.com/ailan/f ... 2 & rootid = 270 & id = 270

Win98 intrusion network can't explain

http://www.sixthroom.com/ailan/f ... 2 & rootid = 271 & id = 271

In fact, there are still some ways, such as sniffing passwords, viruses and Trojans to the mailbox, even with QQ "contact emotions", then pass a tied mougonical flash, etc. I also hit, actually, I don't know what to say, huh, huh).

Based on the same reason, 98 is not a good attack platform. If only port scans, SUPERSCAN can be competent. Vulnerability scanning X-Scan of the Web class can also. However, there is an OS that involves IPC $, a vulnerability, a remote control tool, and a service (such as SQL) to "build NT technology". Good client in the 3389 terminal, can be 98, so first, a 3389 broiler is an evading problem. If you are still using 98, sincere advice you: please use 2000. If you are in the Internet, try the invasion network bar server. (I have to add a sentence here if you use 98 systems, which is also a good thing to choose the signs of the buddha. However, there are many features that are still unused).

Given that the problem of 98 is not high, there is no deep exploration value, so I will talk about it. (personal opinion)

Related tools:

NetPass 1.0 crack 98 shared password

Http://lovezxd.myetang.com/indexpage/indextool/netpass.zip

CAIN V2.5 Comprehensive Crack Tool

http://www.qq888.com/down/download.asp?did=968

Exebinderz 1.3 EXE Bundle

Http://www.heibai.net/download/show.php?id=3028&down=3

Superscan3.0 Chinese version download

http://download.pchome.net/php/d ... Erscanv30.exe & SVR = 3

X-scan2.3 download

http://www.xfocus.net/download.php?id=366

Download

http://www.netxeyes.com/cfluxay2k1for98setup.exe (because Fanye is unwilling to see the work of adding patch, in order to respect his elderly, this is not to provide a patch download, you need to go to find it).

Terminal service client

http://arm.533.net/hack/winterminal.zip (both 3389 connector)

Chapter 6 ------ About IPC $, Empty Connection and Default Sharing

Brief description:

***** The first thing to point out is that the empty connection and IPC $ are different concepts. The empty connection is a session established with the server without trust, in other words, it is an anonymous access to the server. IPC $ is a named pipe that opens inter-process communication and can obtain appropriate permissions by verifying usernames and passwords. There are many tools that must be used in IPC $. The default sharing is to facilitate remote management and open sharing, including all logical dishes (C $, D $, E $ ...) and system catalog Winnt or Windows (admin $). ****** Personally think this is very important, because many people don't know what is empty connection, what is IPC $. It is recommended that friends don't know carefully. This problem should not be known.

Related Posts:

Reject behind the black hand to spy the IPC $ vulnerability

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 281 & id = 281

IPC invading full Raiders

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 278 & id = 278win2k in the default sharing of C-drive and the equation is going on

http://www.sixthroom.com/ailan/f ... 2 & rootid = 282 & id = 282

Cancel the default sharing ≠ safe

Http://js00.51.net/23/wudi/show. ... p; id = 20021017212524

Frequently asked questions and answers:

First, how to build an empty connection, what is it used?

A: Use the command NET USE / iPIPC $ "" / user: "to create an empty connection to the target (requires the target open IPC $).

For NT, in the default security settings, you can list the sharing of target users, sharing, access Everyone privileges, access small partial registry, etc., without any utilization value. It is smaller for 2000. And it is not convenient to achieve tools. If you don't understand why "useless", you will look at the "professional" explanation:

Air connection under NT / 2000

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 280 & id = 280

Anatomy of empty space under Win2k

http://www.sixthroom.com/ailan/f ... 2 & rootid = 283 & id = 283

Second, why can't I even connect IPC $?

A: 1, only NT / 2000 / XP and above can establish IPC $. If you use 98 / me, there is no such thing.

2, confirm that your command is not wrong. The correct command is: NET USE / Target IPIPC $ "Password" / User: "User Name"

Be careful not to have more or less space. Double quotes on both sides may be omitted when the user name and password do not contain spaces. Empty password "" means.

3. Analyze the cause of the error number returned:

Error number 5, refuse to access: It is very likely that the user you use is not administrator privileges, first improve the permissions;

Error number 51, Windows can't find network path: there is a problem with the network;

Error number 53, can not find the network path: IP address error; the target is not boot; the target LanmanServer service is not started; the target has a firewall (port filtering);

Error number 67, find the network name: Your LanmanWorkStation service is not started; the target deletes IPC $;

Error number 1219, provided credentials and existing credential sets: You have established an IPC $ with each other, please delete again.

Error number 1326, unknown username or error password: The reason is obvious;

Error number 1792, trying to log in, but the network login service is not started: The target Netlogon service is not started. (This event occurs in connection domain)

Error number 2242, this user's password has expired: the target has an account policy, enforces the change in periodic requirements.

4. About IPC $ can't connect the problem, this forum did not summarize a unified understanding, I sometimes got a contradictory conclusion on broiler, very difficult. And I know the problem, if you don't have a shell with other ways, many problems still can't resolve. The problem is not suitable for discussion in this article too detailed. Look at it, huh, huh. Third, how to open the target of IPC $?

A: First you need to get a shell that does not rely on IPC $, such as SQL CMD extensions, Telnet, Trojan. Of course, this shell must be admin privileges. Then you can use the shell to execute the NET Share IPC $ to open the target's IPC $. From the previous question, you can know that IPC $ can use many conditions. Please confirm that the relevant services have been running, not starting it (don't know how to do it, see the usage of the net command). Still don't work (such as a firewall, can't kill) it is recommended to give up.

Fourth, how to map and access the default sharing?

A: Using the Command NET Use Z: / Domestic IPC $ Password "/ user:" User Name "to map the other party's C drive to its own Z disk, other disk classes push.

If IPC $ has been established with the target, you can use IP addresses to add $ access. For example, Copy Muma.exe /ipd (Patmuma.exe. Or reproduction can also be mapped, just do not need the username and password: Net Use Y: / ipd $. Then Copy Muma.exe Y: pathmuma.exe. When you contain spaces in the path, you must use "" to fully lead the path.

5. How to delete a mapping and IPC $ connection?

A: Use the command NET USE / IPIPC $ / DEL to delete and a target IPC $ connection.

Use the command NET USE Z: / DEL to delete the mapped Z disk, and other disk classes are pushed.

Delete all in order net use * / del. There will be prompts that the requirements are confirmed by Y.

Sixth, even IPC $ then I can do?

A: You can use the account number of administrator privileges to connect IPC $, indicating that you can do deeply "communication" with the other system. You can use a variety of command line tools (such as PSTools Series, Win2000SRVRESKIT, TelnetHack, etc.) to get target information, management objects, and services, etc. If the target is open, the default share (no you will help him), you can upload the trees and run. You can also upload it with TFTP and FTP. Tools such as DWRCC, VNC, Remoteadmin (Troja) also have a direct control screen. If it is 2000Server, you can also consider opening the terminal service to easily control. Use the tools mentioned here, please see the instructions or related tutorials.

Seven, how to prevent others from using IPS $ and the default sharing invading me?

A: A, one way is to delete IPC $ and the default sharing. But there will be after restart. This needs to be changed registry.

1, first put existing deletion

NET Share IPC $ / DEL

Net Share Admin $ / DEL

NET Share C $ / DEL

............ (have a few deleted several)

2, prohibiting establishing an empty connection

First run regedit, find the following primary key [HKEY_LOCAL_MACHINESYSTEMCURRENTCONTROLSETCONTROLLSA] to change the key value of Restrictanonymous (DWORD) to: 00000001.

  3, prohibiting automatic opening of default sharing

For the Server version, find the following primary key [HKEY_LOCAL_MACHINESYSTEMCURRENTCONTROLSETSERVICESLANSERVERVERVERVERVERVERVICESLANSERVERVERVERVERVERVERVESLANSERVERVERVERVERVERVICES] to change the key value of AutoShareserver (DWORD) to: 00000000. For the Pro version, [HKEY_LOCAL_MACHINESYSTEMCURRENTCONTROLSETSERVICESLANSERVERVERVERVERVERVICESLANSERVERVERPARETERS] is changed to: 00000000.

B. The other is to close the IPC $ and the default sharing reliance (not recommended)

Net Stop LanmanServer

There may be prompts that the XXX service will also turn off Whether to continue. Because there are still some secondary services depend on LanmanServer. The general situation can continue to continue.

C. The easiest way is to set complex passwords to prevent via IPC $ exhaustive password. But if you have other vulnerabilities, IPC $ will be convenient for further intrusion.

D, there is another way to install a firewall, or port filtering. The method of firewall is not said, port filtration is here:

The local policy is configured to prohibit the 139/445 port:

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 284 & id = 284

Chapter 7 ------ Vulnerability on Scanning

Brief description:

Many scanners have vulnerability scanning functions. When you get some host's vulnerability list, don't rush to post them on the forum, and you will expect others to analyze and tell you how to use. You should first try to do this. The scanned vulnerability is not useful, and some of the vulnerabilities are over time, a part is a false statement. If you want to know more, it is best to go to the website that is relatively fast, and the use of vulnerabilities is a process of not accumulating. Time is long, I believe you will experience it.

Vulnerability search:

Green Alliance Engine

http://www.nsfocus.net/index.php?act=sec_bug

Blue shield engine

http://www.landun.org/zhongyao/sousuo.htm

Replenishment

http://www.patching.net/otherweb/leak/leakindex.asp

Safety focus engine

http://www.xfocus.net/vuln/index.php

Xiao Fengju engine

http://lilitou1.myetang.com/

Related Posts:

Discovery and utilization of a CGI vulnerability

http://www.sixthroom.com/ailan/f ... 2 & rootid = 285 & id = 285

CGI vulnerability

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 293 & id = 293

Common CGI vulnerability and dealing with two

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 286 & id = 286

Common CGI vulnerability and response

http://www.sixthroom.com/ailan/f ... 2 & rootid = 287 & id = 287

Windows 2000 Vulnerability Highlights 1

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 288 & id = 288

Windows 2000 Vulnerability Highlights 2

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 289 & id = 289

Windows 2000 Vulnerability Highlights 3

http://www.sixthroom.com/ailan/f ... 2 & rootid = 290 & id = 290windows 2000 Vulnerability Highlights 4

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 291 & id = 291

Windows 2000 Vulnerability Highlights 5

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 292 & id = 292

ASP vulnerability

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 294 & id = 294

IIS vulnerability

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 295 & id = 295

IIS vulnerability

http://www.sixthroom.com/ailan/f ... 2 & rootid = 296 & id = 296

China Network Security Response Center Various Vulnerabilities

http://www.cns911.com/holes/linux/list.php

Chapter 8 ------ About promoting permissions

Brief description:

The ultimate goal of hackers is to get root (ie, admin) permissions. A real hacker will make an invasion as a piece of work, not to give up easily, but some vulnerabilities (typical as Unicode vulnerabilities, ASP Trojans) cannot directly obtain administrator privileges, so it will need to increase permission. Some newcomers may make such mistakes, thinking that there is a shell to control everything. As a result, "why not add users", "why not open 3389" and so on. 2000 and higher OS inherited the security structure of NT, multiple mechanism loop deduction to ensure safety, especially account security. The helpless security system is too large, and how many vulnerabilities have, so we have the opportunity. Also add a little, just get a ready-made back door software, or when a Trojan, you must first see the description. At least you should know the effect after this back door is running? Some people have uploaded a back door software or the Trojan, I think it is good after going to the target. If you don't perform it, what is the use of a mine?

Related tools:

Erunasx uses Debug Registers vulnerability to improve permissions

Http://www.qq888.com/down/download.asp?did=796

Windows NT / 2000 Permission Tools can enhance any user to the SYSTEM level permissions. Vulnerability out of the Debug subsystem in Smss.exe, all ordinary users can obtain control of any process or thread handle in the system through this vulnerability, so that any command can be performed with SYSTEM or administrator privileges. 2, how to use: Suppose we have got a Guest user (or other ordinary users) on a machine, now we want this tool to get the highest permission of the system. Perform the following steps: Copy the two files of Erunasx.exe and Erunasx.dll to the visible directory on the target host, for example C:. Run "ERUNASX to perform command" as guest, such as "ERunasx cmd.exe", the command executed at this time is running in system permissions ... (please note: Specific use in software informal English instructions, within BUG solution)

PipeUpadmin is effective for SP1 and lower

Http://maopao.com/down/download.asp?did=69

ISPC uses IIS vulnerabilities, see

http://www.cnsq.net/sq88/down/show.asp?id=572&down=1phpbb Forum Permissions Improvement

Http://www.newyouth.org/softdown ....0.exploit_code.zip

Win Help file overflow (available for XP)

http://www.newyouth.org/softdown ... ACK / CHMOVERFLOW.ZIP

NT / 2K permission promotion tool getadmin download

http://www.9cbs.net/cnshare/soft/openfile.asp?kind=1&ID=9807

Related Posts:

NT / 2000 method of upgrading permissions

http://www.sixthroom.com/ailan/f ... 2 & rootid = 297 & id = 297

About Win2000 invasion, and security defense, etc. (article contains a process of using U vulnerabilities to improve permission)

http://www.sixthroom.com/ailan/f ... 2 & rootid = 298 & id = 298

Unicode vulnerability introduction and invasion

http://www.sixthroom.com/ailan/f ... 2 & rootid = 299 & id = 299

How to improve permissions, do the back door

http://www.sixthroom.com/ailan/f ... 2 & rootid = 300 & id = 300

General User How to get NT server admin privileges

http://www.sixthroom.com/ailan/f ... 2 & rootid = 302 & id = 302

Windows NT4 security structure (some difficult to do, understand it)

Http://www.sixthroom.com/ailan/f ... 3 & rootid = 303 & id = 303

Chapter 9 ------ About Making Agent and Stripboard

basic introduction:

Proxy server English full name is Proxy Cerver, its function is the network user to obtain network information. The image said: it is a transfer station of network information. In general, when we use the web browser to connect to other Internet sites to get network information, we must send the request signal to get an answer, and then the other party will transfer the information in BIT. The proxy server is a server between the browser and the web server. After it has it, the browser is not directly to the web server to retrieve the web page but to send a request to the proxy server. The Request signal will be sent to the proxy server. Remove the information required by the browser and transfer it to your browser. Moreover, most proxy servers have buffering functions, just like a large cache, it has a large storage space, which constantly stores new acquisition data to its local memory, if the data requested by the browser In its native memory already exists, it does not re-resend data from the web server, and directly transmits the data on the memory to the user, so it can significantly improve the browsing speed and efficiency. More importantly: Proxy Server is an important security feature provided by the Internet link level gateway. Its work is primarily a dialogue in the open system Internet (OSI) model, with a proxy understanding, I believe you also realize what is a springboard.

Related tools:

SOCKSCAP 2.2 SOCKS Scheduling Tools

http://www.123gz.com/dzc/download/sc32r231.exe

SKSOCKSERVER 1.04 agent springboard http://www.123gz.com/dzc/download/sksockServer.zip

Snake Skywriting Fool Edition

http://www.123gz.com/dzc/download/sgtb.zip

Agent Hunter V3.1Beta1 Laid Edition

http://www.123gz.com/dzc/download/proxyhunter.zip

FTP Serv-U 4.0 official Chinese version, the most commonly used FTP service

Http://61.159.24.188/makesoftur ... 627E207574756375737

SLIMFTP hidden FTP server

http://www.whitsoftdev.com/files/slimftpd.zip

Dai Yan web server does not need to be installed small web service procedures

http://www.cnzz.com/download/do ... 33352254709 & url = 100

A variety of service sergers download

Http://www.zdnet.com.cn/download/windows/business/swlist/0,2008004954,39000268r, 00.htm?sort=5

Related Posts:

Proxy, broiler, springboard concept

http://www.sixthroom.com/ailan/f ... 2 & rootid = 305 & id = 305

Proxy server (Proxy) fully resolved

http://www.sixthroom.com/ailan/f ... 2 & rootid = 307 & id = 307

How to use proxy servers

http://www.sixthroom.com/ailan/f ... 2 & rootid = 309 & id = 309

Simple production springboard

http://www.123gz.com/dzc/sksockserver-cusky.htm

Serv-U sets tutorial

http://www.enanshan.com/ftp/

Sockscap32 use details

http://www.123gz.com/dzc/sockscap32.htm

Install FTP server on broiler

http://www.sixthroom.com/ailan/f ... 2 & rootid = 306 & id = 306

Use Unicode vulnerabilities to easily build your own proxy server

http://www.123gz.com/dzc/sksockServer- Nicky-1.htm#top1

Special recommendation hunter and ant collector

http://www.123gz.com/

Chapter 10 ------ About Terminal Services (3389)

Brief description:

Windows Terminal Services provides the ability to remotely access server desktops remotely through "thin client" software that works as a terminal emulator. The graphical interface and the characteristic of the current local user is its largest advantage. Since it is the function of 2000 Server and the above version, it has become a strong "back door". And Win98 can also be a client, which makes it possible to "work" online. One thing to emphasize that the client landing the remote host has no effect on the current work, and all the action local users can not see. That is to say, remote login and local users are different spaces, both from each other.

Related tools:

Win2000 client

http://zudu2000.myetang.com/soft/win2k.rar

Client functions under WinXP are more powerful than 2000

http://zudu2000.myetang.com/soft/windowsxp.zip

A patch of the terminal service program enables local and remote to copy text

http://www.sandflee.net/wawa/tools/rdpclip_hotfix.exe

WEB Terminal Client Using Browser Call ActiveX Control Access Terminal Services http://www.enanshan.com/down/tswebsetup.exe

C3389.exe Modify Tools for Terminal Services Port Number

http://www.sandflee.net/down/show.asp?id=228&down=1

File package required for Win2K terminal server

http://www.netsill.com/download/download.asp?did=1965

3389 Automatic Setup - DJShao official version 5.0

http://netsill.com/download/download.asp?did=2019

Open 3389 tool (if you want to turn the remote host to turn on the Win2000 terminal service, please also transfer 3389.exe to the remote host. Then wait for a long time (because it is unmanned). You can see it. The 3389 port of the remote host will be opened.)

http://netsill.com/download/download.asp?did=1991

W2K terminal service client installation version

http://www.sandflee.net/down/show.asp?id=39&down=1

Related Posts:

Posts about remote launch terminal services

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 385 & id = 385

Terminal service problem FAQ

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 386 & id = 386

Photo explanation of input method vulnerability invasion

http://www.sandflee.net/txt/list.asp?id=22

3389 Automatic Installation Tool Tutorial

http://netsill.com/download/download.asp?did=2068

3389 Animation Tutorial (Password China)

http://netsill.com/download/download.asp?did=1990

Modify the end client port animation tutorial

http://netsill.com/download/download.asp?did=2009

3389 data

http://www21.brinkster.com/srob/wawa/wawa/3389txt.htm

Chapter 11 ------ About cloning account

Brief description:

The principle of cloning account is simple to say that there is two SID relative flags that hold the account in the registry, one is the subkey name under SamDomainSaccountUsers, and the other is the value of the sub-key of the subkey. . Here, Microsoft has led to the mistakes that do not synchronize their, and the latter is used when logging in. When you override the F items of other accounts with admin, the account is administrator privilege but the query is still the case. The so-called cloning account. (The predecessors are the predecessors to write everyone, I really don't know what it is adding here. It seems that there is only this. If you have anything you don't understand, you will send a post in the forum.

See here:

Anatomy Security Account Manager (SAM) structure

Http://www.sixthroom.com/ailan/f ... 3 & rootid = 387 & id = 387

After understanding the principle, you can manually or clone your account with ready-made tools.

Related tools:

Clone Ca.exe

http://www.netxeyes.org/ca.exe

Check the clone cca.exe

http://www.netxeyes.org/cca.exe

Manual clones need system permissions, use it PSU.exe

http://www.sandflee.net/down/show.asp?id=176&down=1 Related Posts:

Tool Cloning: CA and CCA Please visit the author homepage

http://www.netxeyes.org/main.html

PSU usage: PSU.exe upgrade to System permissions

Http://www.sixthroom.com/ailan/f ... 2 & rootid = 390 & id = 390

Manual clone: ​​How to clone the administrator account

http://www.sixthroom.com/ailan/f ... 3 & rootid = 388 & id = 388

How to clone the replenishment of the administrator account

Http://www.sixthroom.com/ailan/f ... 3 & rootid = 389 & id = 389

转载请注明原文地址:https://www.9cbs.com/read-72628.html

New Post(0)