Analysis of hacker intrusion into Linux operating system instances

Source: Internet
Author: User

I found a website and it is a Linux operating system server, so it is a conventional intrusion. Well, its FINGER is on, so I compiled a SHELL and the aaa account tried zzz (by the way, this is an online rule I found, that is, the length of the account is proportional to the strength of the password. If an account has only two or three digits long, the password is generally very simple, and vice versa, so it is also called the owner's theorem ), as a result, an account does not exist. I did not try again. Because I was attracted by the port opened by it, and it opened WWW, I don't believe it won't go wrong. Five kinds of CGI and WWW scanners were taken in a row. A total of 300 or 400 common errors were scanned, and almost none of them existed. (There are several errors, but I don't know how to use them. Forget it. A few laps around the host, like a fox meeting a hedgehog, no way to mouth.

Let's take a look at the root Information:

Finger root@xxx.xxx.xxx

Login name: root In real life: system PRIVILEGED account

Directory:/Shell:/bin/sh

Last login Fri Jul 28 on ttyp0 from 202. xx

No Plan.

Root often comes. The 202. xx is his workstation. Will you see something from there?

Net view \ 202. xx

Shared resources at \ 202. xx

Sharename Type Comment

X

X

My briefcase

The command was completed successfully.

The "file and printer sharing" service on WINDOWS is easy for many people to take lightly. This root is no exception. It would be nice if its drive C is shared and writable, but it is a dream. Now, no shared directory is the root directory, and no D Drive is available. Don't worry. Come on. The folders dropped by x are useless and cannot be written. There are all original English files in the folder. This root is quite good. "My Briefcase" attracted my attention. This is a tool used to synchronize data on different machines. Obviously, this root often updates the home page on the host, sometimes it is compiled on your own machine, sometimes on the host ...... So it is very important that the sharing of "My Briefcase" is generally writable!

  • 1
  • 2
  • 3
  • Next Page

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.