Brief discussion on the role of Net.exe and Net1.exe in Hacker invasion

Source: Internet
Author: User
Tags net command

NET commands are important in the process of hacking the site, but sometimes you will encounter a situation where the net command cannot be executed or net.exe deleted. For the former, you can try to use the NET1 command instead of the Net command, which is more powerful and more functional. For the latter, you can upload your own net or NET1 components.

Let's simulate this in a virtual machine.

One, Environment: Windows XP SP3, current User: Guys, administrator rights.

650) this.width=650; "title=" 0.jpg "style=" Float:none; "src=" http://s3.51cto.com/wyfs02/M02/5B/39/ Wkiol1ucpdlxxu9caaf9ap2sl54705.jpg "alt=" Wkiol1ucpdlxxu9caaf9ap2sl54705.jpg "/>

Two, the implementation of the net and the Net1 command, which looks like the function is the same. Later, they differ in their permissions.

650) this.width=650; "title=" 1.jpg "style=" Float:none; "src=" http://s3.51cto.com/wyfs02/M02/5B/39/ Wkiol1ucpdpjqklaaahkccayumg406.jpg "alt=" Wkiol1ucpdpjqklaaahkccayumg406.jpg "/>

Third, then use cacls to view the net and Net1 component user rights, you can see different users, permissions from no permissions to Full Control are limited. The cacls command can display or modify any access control List (ACL) file.

650) this.width=650; "title=" 2.jpg "style=" Float:none; "src=" http://s3.51cto.com/wyfs02/M02/5B/3F/ Wkiom1ucoxkdygftaahbgsbqfcy792.jpg "alt=" Wkiom1ucoxkdygftaahbgsbqfcy792.jpg "/>

Four, let's remove the guys user's access to Net1, and also discover that the net command cannot be executed. If you restrict permissions to net only, Net1 is unaffected.

650) this.width=650; "title=" 3.jpg "style=" Float:none; "src=" http://s3.51cto.com/wyfs02/M00/5B/39/ Wkiol1ucpdwwwlszaaelg8xq6pa148.jpg "alt=" Wkiol1ucpdwwwlszaaelg8xq6pa148.jpg "/>

Five, we can restore full control of NET1 with the following command.

650) this.width=650; "title=" 4.jpg "style=" Float:none; "src=" http://s3.51cto.com/wyfs02/M02/5B/3F/ Wkiom1ucoxswubfzaafxcggwiqs996.jpg "alt=" Wkiom1ucoxswubfzaafxcggwiqs996.jpg "/>

Six, you will be prompted to use the Icacls command under Win7. Icacls refers to displaying or modifying a discretionary access control list (DACL) on a specified file, and specifying that the file in the directory is applied to the stored Dacl.

650) this.width=650; "title=" 5.jpg "style=" Float:none; "src=" http://s3.51cto.com/wyfs02/M00/5B/3F/ Wkiom1ucoxwznmlgaafaif2422s724.jpg "alt=" Wkiom1ucoxwznmlgaafaif2422s724.jpg "/>

This article is from the "Nocturnal Person" blog, so be sure to keep this source http://zerosecurity.blog.51cto.com/9913090/1620143

Brief discussion on the role of Net.exe and Net1.exe in Hacker invasion

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.