You are here: hacking technology > hacker invade > Content
Hot Articles
Recommend Articles
New Articles
Invades the Linux operating system example
  Add date: 07/10/2008   Publishing date: 07/10/2008   Hits: 78
Total 2 pages, Current page:1, Jump to page:
 
I have discovered a website, therefore conventional invasion. Very good, its FINGER is opening, therefore I arranged a SHELL, aaa account number to try zzz (by the way, this was on-line rule which I discovered that that was account number length and password intensity is proportional, if an account number only then 2-3 were long, then its password also was very generally simple, vice versa, therefore, and called it, if theorem), a result account number did not exist, I did not have to try its account number again. Because I am opened by it the port attracted, it was opening WWW, I did not believe it not to make a mistake. One has taken five kind of CGI and the WWW scanner grand total sweeps 300-400 kinds to be common wrong it nearly not to exist has a look at root the information:

  finger root@xxx.xxx.xxx

  Login name: root In real life: system PRIVILEGED account

  Directory: /Shell: /bin/sh

  Last login Fri Jul 28 09:21 on ttyp0 from 202.xx.xx.xx

  No Plan.

  root comes frequently, that 202.xx.xx.xx was the workstation which he used, could see a thing from that?

  net view \ 202.xx.xx.xx

  Shared resources at \ 202.xx.xx.xx  

  Sharename Type Comment

  x

  x

  My briefcase

  The command was completed successfully.

  Is opening WINDOWS on the surfer machine “the document and printer sharing” the service, is many people easy to lower one's guard, this root does not have the exception. If its C plate shared and has been possible to write that to be good, but that has a dream, now has opened sharing table of contents one has not been the root directory, Lian DQU does not have. Do not worry, take your time. x falls these folders are useless, cannot write, inside is the English original works, this root is also very good. “my briefcase” has attracted my attention, this will be one uses on the different machine's material carrying on synchronized the tool, this root must renew on main engine's main page frequently very obviously, sometimes will arrange on own machine, sometimes will arrange on the main engine ......Therefore a very important point: “my briefcase” sharing is generally may write!  

  Then I go in again have a look.  

  >net use i: \ 202.xx.xx.xx

  >i:

  >echo asdf>temp.txt  

  Good, may write truly. 

  >del temp.txt  

  Not scar - - black guest's custom. 

  >dir/od/p  

  Has a look at some anything ...... What from the bottom second row of that is? “X month work plan .doc”! Was it, since one side were the plan is impossible to finish has lost, it definitely once more will open it - - the next month wrote when at least the plan wants COPY: - >  

  Should begin, the wooden horse which next time my goal was will let it turn on when my trap moves I to hide by mistake. What I this time with is a keyboard idea records software HOOKDUMP, I thought that it very good, the price is materially beneficial, quantity also foot ...... Sorry, says be used to it, under should be it not only records strikes the key completely, but also under recorded opens or switches off any procedure, to press any push button, to use any menu ...... In brief, its record lets you stand with you in him after death looked that he operated the computer to be equally detailed. You must ask why that many wooden horses you do install this? Must know, regardless of being China's glacier, netspy or foreign netbus, BO, is killed by each kind the poisonous software to list as the top-quality detection object, but on a root machine is possible not to install kills the poisonous software? HOOKDUMP is good, small, commonplace, but if everybody uses only to fear that I used its opportunity to be short again ......  

 
Other pages: : 1 * 2 * Next>>
Prev:The local area network invades the full page Next:Invades in the process the simple duty

Comment:

Category: Home > hacker invade