You are here: hacking technology > hacker course > Content
Hot Articles
Recommend Articles
New Articles
The mainstream raises the power technology comprehensive work with the non-mainstream(4)
  Add date: 07/14/2008   Publishing date: 07/14/2008   Hits: 6
Total 4 pages, Current page:4, Jump to page:
 

“C:\WINNT\system32\inetsrv\ssinc.dll” “C:\WINNT\system32\msw3prt.dll "" c:\winnt\system32\inetsrv\asp.dll” 
May use cscript adsutil.vbs the get /W3SVC/InProcessIsapiApps to examine that added

8. the script proposes the power
c:\Documents and Settings\All Users \ “the start” menu \ procedure \ starts " reads in bat, vbs

9.VNC
This is floret's article HOHO 
In the default situation the VNC password deposits in HKCU \ Software \ ORL \ WinVNC3 \ Password
We may use vncx4 to explain it, the vncx4 use is very simple, so long as inputs c:\ >vncx4 under the command line - the W then order to input the above each sexadecimal number data, has not lost a carriage return one time to be good.

10.NC proposes the power
Comes NC for opposite party, but the condition was you must have the enough movement jurisdiction then to bounce it to own computer on HOHO OK

11. GUEST of social engineering proposes the power
Examined very simply his support generally speaking saw the account later the password as far as possible guessed the possible user password equally also possibly is his QQ number mailbox trumpeter serial number has a look at HOHO as far as possible

12.IPC spatial connection
If opposite party compares idiot to sweep his IPC really if luck good weak password

13. replace service
This has not needed to say? Individual feeling is quite complex

14.autorun .inf
autorun=xxx.exe this = behind write HOHO to add on read-only, the system, which plate the hideaway attribute does pass to be possible did not believe that he does not move

15.desktop.ini and Folder.htt
Quotation: First, we local establish a folder now, the name are unimportant, enter it, in a blank right key, the choice " from defines the folder " (xp is probably incorrect) under has selected, default then. After completing, you will see under this table of contents many two named Folder setting pigeonhole and the desktop.ini document, (, if you will not look, cancelled " hideaway osfile which protected " then we in Folder under the setting table of contents to find first) the Folder.htt document, the memorandum opens, joined the following code in the random place: Then you place yours backdoor file Folder under the setting table of contents, uploads together this table of contents and desktop.ini to the opposite party random catalog, might, so long as and so on managers glanced over this table of contents, it has carried out our back door

the 16.su cover proposes the power
This locality installs su, with ServUDaemon.ini which downloads from his that covers yours ServUDaemon.ini document, heavy Serv-U, therefore above you all dispositions were entirely alike with him



 
Other pages: : <<Prev * 1 * 2 * 3 * 4
Prev:A simple invasion, does as a temporary measure the Mysql5 injection backup Next:The bored Css cross station hangs the horse

Comment:

Category: Home > hacker course