Today's topic is how to find UNIX bots. I think this is necessary for a man who has many windows bots but does not have UNIX bots.
Go straight to the question. Why am I looking for BOTs with X-laser? Because all our operations are performed on 3389 bots. First, we all go to the same terminal (premise: the terminal is open to the peer, rather than your own, so that the terminal service manager is available) then, Use Terminal Management in the management tool to switch the ID (select the user to connect)
In this way, two people can control each other, and every action is clear. This method is good, greatly improving efficiency and increasing the pleasure of intrusion. We recommend that you promote it :)
Now let's start working. Since we are engaged in UNIX classes on win, we 'd better have exploit on win to get the first UNIX bot. The exploits used in win can be downloaded using cygwin compilation (on www.isfocus.com. You can download the cygwin1.dll file from e4gle.org or www.cnhonker.net/old.php.
What we need to do now is to find a large number of UNIX bots and then find the vulnerabilities. But how can we find them? At this time, we have requested our mongoard network plugin. After a simple setup, let him run quickly, we will start scanning.
We can see that there is a FreeBSD, which is a good bully because there was a popular telnetd Remote Overflow Vulnerability some time ago. Of course, we can also use superscan to quickly determine the operating system. We use superscan to scan port 23, Because telnet usually has a banner, so that we can know the operating system type.
We scanned two Linux servers ,..... ... #... 'Is the identifier of Linux.
........ #... '... $ Is the SunOS identifier. If you use it, you will have experience.