You are here: hacking technology > hacker invade > Content
Hot Articles
Recommend Articles
New Articles
Uses 135 ports to invade the personal computing fast
  Add date: 11/10/2008   Publishing date: 11/10/2008   Hits: 305
Total 2 pages, Current page:1, Jump to page:
 
In fact is attacks the computer through 135 port invasions using the RPC crack. The ordinary circumstances next 135 ports mainly use in using RPC (Remote Procedure Call, long-distance procedure call)

  The agreement and provides DCOM (distributional module object model) to serve, through RPC may guarantee that moves the procedure on a computer to be possible to carry out on the long-distance computer's code smoothly;

  Uses DCOM to be possible to carry on the correspondence directly through the network, can step including the HTTP agreement many kinds of network transmission. RPC itself has a crack in processing through the TCP/IP news exchange part, this crack is because processes the form not correct news to create wrongly. Will affect between RPC and a DCOM connection, this connection interception's port will be 135.

  Below I introduced that the method which invades through 135 ports.

  (1) through 135 port invasions, the aggressor first needs to search in the network to have 135 port crack's host address, in searches in this kind of main engine process, may use some to scan the tool, for instance SuperScan is one of typical port tools. Start address which “the start” in the text frame the input needs to scan in SuperScan, then in the text frame filled in the good scan end in “the conclusion” the IP address, in the option chose “all port definition” in “the scan type” to choose the button only, and input in the right flank text frame “135”. The click “the start” the button then starts to scan again. After scan end, in the underneath tabulation may examine the goal main engine opens port. Then clicks on “Save” the button to choose the preserved way again, has under crack's IP reorganization inside then.

  after (2) obtains has the crack, we also have a function formidable scanning tool, for instance NTSscn sinicizing version. Then place the click “opens” the IP way which in “the main engine document “the button found us to preserve a moment ago, shared $ choices in the connection “the WMI scanning”, “turned on port's main engine in the scanning” place the filling in 135 ports. Finally click “start” then. How long won't be able to want to have the result demonstration.

  after (3) obtains the crack host subscriber name, we need an opening the tool, that is Recton v2.5. Good, all things have it to owe that “the east wind” to pull. IP which just scanned inputs the TELNET contact surface “the long-distance main engine” place, as well as user name and password, but in the ordinary circumstances the password is spatial. The next step the click “starts to carry out” the button to wait for that opens TELNET. After opening, inputs CMD according to WIN+R to enter inputs Telnet again the IP carriage return, will prompt lets you input user, after a user input, the carriage return will then enter the main engine. Moreover obtains SYSTEM jurisdiction.

 
Other pages: : 1 * 2 * Next>>
Prev:The MS08-067 crack invades the chart article illustration (chart) Next:IDQ benefits the crack to invade the graphic solution (chart)

Comment:

Category: Home > hacker invade