View vulnerabilities in Internet cafe network management software

Source: Internet
Author: User

At present, almost all Internet cafes use Internet cafe management software, such as "Internet cafe management experts" and "Meiping Network Management. They use this software for almost the following reasons: Timing fees, preventing manual modification and damage to computer systems, forbidding and filtering pornographic websites, and Dynamically Monitoring computers that access the internet.
However, all these Internet cafe management software have many vulnerabilities. I hope this article will attract the attention of software companies and software authors and make improvements.

I. Actual Situation Analysis

I often access the Internet in many Internet cafes in Zhengzhou. There are many Internet cafes in Zhengzhou, and the speed of Internet access is also fast. A large number of Internet cafes have more than one hundred machines and a small number of 20 or 30 machines. Generally, they are connected through ADSL or DDN. Although various Internet cafes use different Internet cafe management software, the computers in these Internet cafes share some common features: the basic configurations of computers in Internet cafes are generally 650,128 M memory and 20 GB hard disk, TNT M64 display card, 17-inch color display. The 20 GB hard disk is divided into three partitions: C, D, and E. The Administrator shields the C and D partitions, because the C disk is used as the system disk and the D disk is used as the backup disk, drive A and drive E are provided to users, who can download software, music or data storage from the Internet. After windows is started, the Internet cafe management software is automatically started, and the entire interface is replaced by the Internet cafe management software; disable Registry Editor; Disable Internet Options of IE; Disable entering C or D in the address bar of IE to access the system and backup disk; Disable operation of Control Panel; the display attribute cannot be adjusted. Only applications specified by the Internet cafe management software can be run. The F8 key after the host is switched on or off and windows safe mode is disabled. These settings must be highly secure for normal users.

Ii. Vulnerability search

You can modify the system using the following method.

1. Create a new file, such as aa. reg. The file content is as follows:

REGEDIT4

[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion

\ Policies \ System]

"DisableRegistryTools" = dword: 00000000

Double-click the file to add the information to the Registry. In this way, the Registry Editor can be used. In fact, you can use all the resources in windows by modifying the registry, but it is difficult for common users, so the following are some simpler methods.

2. Download winrar from the Internet and download it to the huajun Software Park.) install the software on the Elastic Compute Service (ECS) instance. After the installation is complete, click Run. On the winRAR main menu, select change drive, and enter c: in this way, you can also download the Opera Browser to run the program, and enter c: in the address bar to enter the system disk ). Go to the C: \ WINDOWS \ SYSTEM directory and find "display desktop. scf "this file is running, then the entire desktop will return to the original windows desktop, right-click and click" properties "to enter the" Display Properties "panel, here we can easily modify the display resolution and update rate. By the way, when you change the monitor, the mouse stops at a certain position and cannot be moved, probably because of the internet cafe management software. But it doesn't matter. You can use the TAB key to perform normal operations. After the final adjustment, the mouse will return to normal.

3. Locate Inetcpl in the C: \ WINDOWS \ SYSTEM directory in the current status. cpp file and renamed it Inetcpl. cpl, so that you can run Internet Options in IE browser.

3. In the previous status, double-click the msinfo32.exe file under the C: \ Program Files \ Common Files \ Microsoft Shared \ msinfodirectory to run it. This is the system information Program in windows, click the System Configuration Utility in the tool menu to run this tool. Here you can modify the system startup file and configuration file as you like, or disable the running of some startup programs, you can even cancel the operation of the Internet cafe management software. In this tool, you can run the control panel and use all the functions in the control panel.

4. After you click Download file in IE, you can enter the C: \ file name to save the downloaded file even though you cannot see the c: system disk in the Save As panel. Next time you download the file storage, you can see the c: system disk. Of course, you can perform the following operations at will.

5. Click an unassociated file. The file opening method is displayed. Click other options. The file Opening panel is displayed. Enter c: \ in the file name to enter the system disk.

6. Go to the Alibaba Cloud Management Software Directory and run uninstall.exe to delete most files of the Internet cafe management software. The software will be deleted after the next machine restart.

7. You can also download software such as windows modification tool from the Internet, install it on the edisk, and run it as needed.

Iii. Recommended Solution

I believe that online computers mainly browse Web pages, query information, and listen to music. Therefore, many functions that can be banned from the system can be disabled.

1. The system prohibits the import of REG files.

2. Prohibit the system from displaying hidden files. This prevents modification and deletion of boot files and system files.

3. prohibit the direct running of EXE files downloaded from the Internet, which is the biggest risk.

4. Disable various compression software from entering C: In the toolbar to enter the system disk for modification. Because many Internet cafe computers install winzip and other compression tool software.

5. prohibit other browsers from entering c: in the address bar to enter the system disk for modification.

In fact, we try to prevent users from accessing the system disk to modify files.

After these settings and the previous security settings, I believe that the computer in the internet cafe should be safe.

Related Articles]

  • Four Common Vulnerabilities in Internet cafe management software
  • Online cracking of some restrictions on Internet cafe management software
  • Three examples of Internet cafe management software cracking

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.