Top 10 vulnerability cracking Internet cafe management software (1)

Source: Internet
Author: User

Internet cafe management software is also available because there are too many people and management is difficult. The network management software came, so it was easy to manage the network. It seemed okay to turn on the computer every day and start the software. But is that true? Just a few clicks, you may find several vulnerabilities, and the network management software will be broken like glass. Believe it?

Nowadays, most Internet cafe administrators use Internet cafe management software such as Meiping to manage the system, users are also prohibited from performing dangerous operations such as deleting files and modifying parameters by modifying the system registry. However, without using any tool or software, some simple methods have easily broken through the restrictions of the Internet cafe management software. All the banned system functions have been revived, and not only files can be deleted, you can also modify the system registry at will, and the entire system can call at will. This time, we will expose all the ten critical vulnerabilities found in Internet cafes to warn every Internet cafe administrator.

I. IE menu Vulnerability

Easy menu Retrieval

The patches of the boss of Microsoft are getting more and more. This doesn't mean that Uncle Bill has more and more vulnerabilities, but is responding to the sentence "there are policies and countermeasures ", the vulnerabilities in the file and tool menu of the old version of the web management software used to block IE are very large. The vulnerabilities in the new version are not easy to detect. However, please refer ......

Exploring desires:★★★★★

Difficult to explore:★★★☆☆

Exploring Method: This time we need to use the shortcut key again. This time it's "Win + D", and refresh the desktop. The desktop under "Mei ping" is actually a directory specified by Mei Ping, the original desktop is hidden, and the refresh is a refresh of the original desktop. As long as you do not switch other windows, my computer will always exist on the desktop. What you need to do is: open my computer and click "up" in the toolbar to open the desktop in the form of a window because the hard disk is blocked, when we open my computer, we can't see anything.) What you need to do now is to create a text document and input the following lines:

REGEDIT4

[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Explorer]

"NoFavoritesMenu" = dword00000000

Save as any file name with the suffix ". reg, when you turn on my computer again, you will see the cute file and tool menu in IE blocked by the network management software.
Ii. Local hard disk Vulnerabilities

Unlock dishes on Hard Disk

What netshers have the most bitter enemy is that they cannot use hard disks. If they don't talk about these sad stories, they will say that you want to download something called "6th" that has been a hero's addiction, but where are the files you downloaded? The following method is used to unlock the device.

Exploring desires:★★★★★

Difficult to explore:★★★☆☆

How to explore: Have you ever seen a tracing notice in the newspaper? Yes. Isn't it a search? The lost person cannot be found, but the hard disk can be found. Most internet cafe bosses use a green light to block hard drives. The reason is that it is no longer simple, because you cannot find the local hard disk in the search box. If you choose my computer to perform the "Search" shortcut key, use the "WIN + F" key, files such as "Command" will be notified that "cannot be found ". But it is not. Enter "C: \" in the search box and press enter to find a lot of things.

In this way, you can access the local hard disk again. Of course, there are also some vulnerabilities that are highly compatible with the operating system and IE: After you open IE, enter "C:" in the address bar and press "enter" to view resources on the hard disk, but this is an old method.

The key here is how to access the local hard disk. Once you enter the local hard disk, a complete computer is in front of a user familiar with the Windows system.

3. program running Vulnerabilities

No operation prohibited

People familiar with computers know that there is a very important program in the Start Menu, that is, running the program. With this program, we can run other programs we want to use, and further implement computer operations. However, when surfing the Internet in Internet cafes, of course it is not that good. Internet cafe bosses always like to install some network management software to prevent us from using it. Alas, there is no way. In this case, we can only find another path! As a result, the method of bypassing the Maginot line of defense emerged.

Exploring desires:★★★☆☆

Difficult to explore:★★★☆☆

In fact, the method is really simple. We have mentioned in other vulnerability methods mentioned above. Of course, it is to modify the registry, but the parameters are different, of course, just change the parameter to run? Here we use the import method for modification. Open a notepad and enter:


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.