Hidden backdoors guard against various traps hidden by Ghost

Source: Internet
Author: User

You still need to make more settings to be more assured

Nowadays, Windows XP systems are widely used to install CDs and files. to install a system, you only need to restore the Ghost image file to restore the system to normal after the system crashes. However, the system CDs of all kinds of universal ghost versions have excellent products and garbage, and they have hidden backdoors!
1. Analysis of XP Universal ghost

When the hichina ghost system is created, the redundant files that come with windows are deleted after the installation is successful, hardware information is deleted, and then the system is encapsulated. If, before installation, the producer intentionally replaces a system file with a Trojan backdoor, or opens some ports in the system, opens some dangerous services, and leaves some Blank Password accounts, then the created ghost system will have various security vulnerabilities. After these ghost systems are circulated, users using these systems may be controlled by the authors as bots.

Ii. Overview of common vulnerabilities in the ghostversion System

1: Remote Desktop with a blank password. You can use a blank password to remotely log on to 3389 and perform operations on the task system. Use the 3389 vulnerability to fl qcoins and steal ADSL Password accounts.

2: Hide the sharing vulnerability. Any user can access and share the vulnerability. If the default ipc $ share is not used, the sharing permission is fully controlled by everyone. There are many purposes. users in the guest group can also format your hard disk.

3: The administrator User Password vulnerability is not described much.

4: Dangerous services can be started. Many dangerous services can be opened in service tools, and users can be remotely connected to this computer on the Remote tab.

5: The firewall has been used. You can see that projects that are not enabled by default are checked.

6: rogue software and Backdoor trojans are installed for users without permission. What's even more frightening is to replace the system file with a gray pigeon Trojan! (And now there is software for cloning system file version information. You can mark the trojan file as a system file, including the logo size !)

Iii. Dangerous Ghostxp System Version Detection

The list of versions with known problems is as follows:

1: Tomato Garden series; Windows XP prosp2 free-of-use version v2.8 and 2.9; New Version

2: Yu Lin Mu Feng series Yu Lin Mu Feng ghostwinxp2v2.0 installed version pure member version y1.7v1.85 and new version

3: Donghai computer company edition ghostxp_sp2 computer company special edition v4.0v4.1v5.0v5.1v5.5 and new version

You can check your system version in the System Properties dialog box to determine whether there is a problem. Other Ghost system versions circulating on the Internet also have more or less the above security problems! Please use it with caution!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.