One day, www.yahoo.com took me to this site
I don't know Japanese, it's full of garbled characters, and I'm bored.
Step 1:
Ping http://www.JAPAN ****. com (note: the assumption is that the http://www.testtesttesttest.com, if there is similar is coincidental)
Pinging http://www.JAPAN *****. com [*****. ****] with 32 bytes of data:
......
(Note: This is assumed to be 123.123.123.123 in the future. It is a coincidence that there are similarities)
Step 2:
Window. Open ('HTTP: // whois.webhosting.info/123.123.123.123 ')
123.123.123.123-IP hosts ** total domains...
Showing 1-50 out of 77
Step 3:
Of course, just click a few sites to play.
SQL (ASP) Vulnerabilities...
Unintentional discovery of an upload Portal
Just upload a FSO operation.CompositionSame as the local test results.
What should I do next?
C:/program files/Serv-U (a common FTP software)
About Serv-U database and database details will be released in http://blog.csdn.net/bigbird998 recently
The database is opened in text format.
Added some data at the end.
Step 4:
Very excited. Step 4: share it with you.
After controlling the SERV-U, you want to operate C: Okay, the entire disk file is under your control
Well, draw the white cloth into a black cloth and put it on him.
No. I added a few cmd commands to C:/autoexec. bat.
Not fun? Do you have any more interesting gameplay?
Step 5:
Of course, the log is deleted. How can I delete it?
Direct deletion cannot be deleted and has system protection.
What should we do?
Autoexec. bat
How can I create a command line? Let me tell you everything. Do you have a sense of accomplishment?
Well, I will spend some time studying it with you later, 886