Intrude into LAN

Source: Internet
Author: User
Tags dameware mini remote control
First, declare: 1. the intrusion scope only covers the lan. If you are in a school, You can intrude into the entire campus network. 2. only weak passwords (such as administrator username and empty password) can be intruded, and port 139 is enabled, but no firewall sub-host is enabled. Intrusion tools: three tools are generally used: NTscan abnormal scanner, Recton -- D, D

First, declare:
1. The intrusion only covers the lan. If you are in a school, You can intrude into the entire campus network. 2. weak passwords (the username is adminis)TrThe password is null), and port 139 is enabled, but the firewall is not enabled. Intrusion tool: Three intrusion tools are generally used: NTscan abnormal scanner, Recton -- D he/she special edition, and DameWare Mini Chinese version 4.5. (Anti-Virus Software of the first two tools will report viruses. We recommend that you temporarily disable anti-virus software in real time and disableCompressionPackets are encrypted to prevent being killed .) Intrusion steps: 1. Use "NTscan abnormal scanner", fill in the IP address range to be scanned, select the "WMI scan" method, and press "start" to wait for the scan results.
 
2. Select "CMD" using "Recton -- D special edition for saving viruses"Command"Item, enter" net share C $ = C: \ "in" CMD: "To enable the shared C disk of the remote host. In this way, replace" C "with D, E, F and so on, you can enable the sharing of D, E, and F disks. This sharing method is highly concealed and completely shared, so there will be no sharing icon holding the disk by hand on the other host, then, enter "\ IP \ C $" in the address bar to enter the target disk C. Select "TeLnEnter an IP address that you just scanned in "remote host" to remotely start the Telnet service. Then, run the following command in "CMD options: "net share ipc $", run: "net share admin $", and then run "net use \\***. ***. ***. * ** \ IPC $ ""/user: administrator "fill in the IP address of the host you have intruded into in.

3. use "DameWare Mini Chinese version 4.5", click "DameWare Mini Remote Control" after installation, select activate product in "help", and enter registration information. After successful registration, enter the "remote connection" window, enter the IP address in "host", click "set", and click "edit" in "service installation options, in the "Notification dialog box", remove "connection notification". In "Additional Settings", all are not selected. In "user options", remove "Enable user options ". After the settings are complete, click "Connect". In the displayed dialog box, click "OK". After the settings are complete, you can control others' computers as you operate your own computers, of course, you can only monitor the screen of the recipient. Note: If you do not register, a dialog box will pop up on the host to expose your identity.
Intrusion step supplement: 1. in step 5 above, you can remotely start the Telnet service by using "my computer-Manage-connect to another computer-enter IP-service and application-service-TelnetChanged to manual-start.

2. recton -- D has other features. In the process item, you can view the process of the remote host and terminate the process at will. In the sharing item, share can be created. I usually create C $, D $, E $, F $, and the share path corresponds to C: \, D: \, etc, after sharing, enter \ IP \ C $ in the address bar to enter the target disk C, and you can copy and delete the content at will, in addition, the share icon is not displayed on the sub-drive letter of the shared device, so it will not be found. It is best to turn off sharing after the sub-drive letter is completed. Finally, select "log" to clear all logs without any trace. This software will be killed as a virus by anti-virus software, and the real-time anti-virus should be disabled when using it.
 
3. the above sharing can be completed through CMD (Program-attachment-command prompt), First "telnet IP", telnet up, Type y, then enter the user name "administrator", the password is blank, after entering, open the share with net share command, share C $ (that is, drive C): "net share C $ = c:", share the system Folder: "net share c = C: \ winnt \ system32 ", shared IPC $ is used:" net share IPC $ ", and so on. Finally, disable sharing and disable drive C sharing:" net share C $/del ".
 
4. to facilitate next intrusion, you can set a backdoor to view the user: "net user", activate the guest user "net user guest/active: yes", and change the password of guest to poco: "net user guest poco" to escalate the permission of guest to administrator permission: "net localgroup administrators guest/Dd". 5. There are many telnet commands (doscommands). You can find the commands on the Internet. Commonly Used Commands include: view the d Drive file: "" dir d: \ ", and view the C drive program.FileFolder: "dir c: \ PROGRA ~ 1 \; ", 60 seconds countdown shutdown:" shutdown-s-t 60"

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.