Key points for Ghost system usage
Nowadays, Windows XP systems are widely used in the world to install CDs and files. It is indeed convenient to use. To install a system, you only need to restore the ghost image file and mount the driver, it takes more than 10 minutes to complete the disconnection. However, among the various systems of the hichina ghost version, there are both excellent products and garbage, and there is a hidden backdoor trap!
1. Analysis of xp Universal GHOST:
When the hichina ghost system is created, the redundant files that come with windows are deleted after the installation is successful, hardware information is deleted, and then the system is encapsulated. If, before installation, the producer intentionally replaces a system file with a Trojan backdoor, or opens some ports in the system, opens some dangerous services, and leaves some Blank Password accounts, then the created ghost system will have various security vulnerabilities. After these Ghost systems are circulated, users using these systems may be controlled by the authors as bots...
Ii. List of common vulnerabilities in the ghostversion system:
1: Remote Desktop with a blank password. You can use a blank password to remotely log on to 3389 and perform operations on the task system. Use the 3389 vulnerability to fl qcoins and steal adsl Password accounts.
2: Hide the sharing vulnerability. Any user can access and share the vulnerability. If the default ipc $ share is not used, the sharing permission is fully controlled by everyone. There are many purposes. users in the guest group can also format your hard disk.
3: The administrator User Password vulnerability is not described much.
4: Dangerous services can be started. Many dangerous services can be opened in service tools, and users can be remotely connected to this computer on the Remote tab.
5: The firewall has been used. You can see that projects that are not enabled by default are checked.
6: rogue software and Backdoor trojans are installed for users without permission. What's even more frightening is to replace the system file with a gray pigeon Trojan! (And now there is software for cloning system file version information. You can mark the trojan file as a system file, including the logo size !)
Iii. Dangerous Ghostxp System Version Detection
The list of versions with known problems is as follows:
1: Tomato Garden series; Windows XP prosp2 free-of-use version v2.8 and 2.9; New Version
2: Yu Lin Mu Feng series Yu Lin Mu Feng Ghostwinxp2v2.0 installed version pure member version y1.7v1.85 and new version
3: Donghai computer company edition Ghostxp_sp2 computer company special edition v4.0v4.1v5.0v5.1v5.5 and new version
You can check your system version in the System Properties dialog box to determine whether there is a problem. Other Ghost system versions circulating on the Internet also have more or less the above security problems! Please use it with caution!