This article was originally written by RainyFox. For more information, see the source.
Hackers always use cmd commands for server intrusion. Most people say that I have been banned, but they have been revoked from command execution. What is the problem? Try this method.
First, choose Start> program> Administrative Tools> Local Security Policy. Right-click the Software Restriction Policy> other rules, as shown in.
Select "hash rule" and click Open "Browse" to go to system system32. Find the cmd command to be restricted, as shown in.
Set the security level as not allowed, as shown in
Then, make sure that you have configured this restriction policy for the command, and you just need to limit all the required commands.
The following figure shows how to select "Software Restriction Policy"-"force ".
Remove all users who apply the Software Restriction Policy to the local administrator.
Otherwise, there will be a lot of harmonious consequences. You should note that if someone wants to modify the hash to bypass the verification, try again.
I have always been looking forward to seeing Daniel break through the Software Restriction Policy and execute the cmd command. In my personal opinion, since the Administrator restrictions can be ruled out, if I have a deep look at how to achieve this effect, overflow should be able to break through