(a) What is ipc$ invasion?
ipc$ intrusion, that is, by using the Windows system in the default boot ipc$ share, to reach the invasion of the host, gain control of the computer intrusion. This kind of intrusion mainly uses the computer user to the computer security knowledge lacks, usually does not give the computer to set the password or the password is too simple, therefore causes the hacker the advantage.
(b) How do I view ipc$ sharing?
First step: Right-click on the management of computers
Second step: Share folder, share, and right to view shared Folders
(c) How to create a ipc$ vulnerability?
First step: Win+r enter gpedit.msc, click OK to open the Local Group Policy Editor
Step Two: Security options, Local policies, Computer Configuration->windows configuration
Step Three : Double-click Security Options
Fourth step: Right-click Network access: local account sharing and security model select Properties, set it to Classic mode
The Fifth step : the same as the account: a local account with a blank password only allows console login to be set to disabled.
This creates an IPC vulnerability.
(iv) What can I do with the ipc$ connection?
We can establish a connection through ipc$, and then send the Trojan or virus to the target host, through the DOS command to run the Trojan virus, the target into a broiler.
Note: In fact, we rarely have the opportunity in real life to personally contact the target host, and to establish ipc$ loopholes, in fact, the method is more for beginners to understand. The real hacker attack and defense in the use of another means to conquer the host
White Hat Hacker Road: (ii) Classic ipc$ invasion of classics--establishment of ipc$ loophole