example, if we have a zombie A and B that we want to intrude into, and A and B are in the same subnet, then we can run the sniffer on a to get the user name and password of B, use the obtained password to access B. This is what sinffer can do. As long as one host in a domain is insecure, the entire domain is insecure. Well, I have explained so many principles. Now let's use xsinff. xsinff is basically only used to capture passwords. It provides the background running and logging functions, in t
use xsinff. xsinff is basically only used to capture passwords. It provides the background running and logging functions, in the common format: C: \ xsinff-TCP-pass-hide-log passwd. log
-TCP indicates capturing TCP packets,-pass indicates the password to be captured,-hide indicates running in the background, and-log stores the captured password in a file. You can specify the file name by yourself, we recorded passwd here. log File.
Finally, some tools have to be mentioned. These tools cannot be
connected it through the terminal service and looked at it. It really cannot be killed using the task manager.Bcvsrv32.exe, but I had to go to the keyboard, mouse, and display and restart the computer several times, so I couldn't help but try another way. So I quickly went through Google,Download the two management tools tlist.exeand pskill.exe(tlist.exe can be downloaded from win2000SupportToolsfound, pskill.exe can be downloaded from various hacker tool websites), tried, did not expect to sol
During Penetration Testing, some software may inevitably affect penetration testing. In this case, some measures or tools are required to end the process that hinders penetration, this article shares the small tips of the three ending processes, pure kepan, which is just a reference, as shown below:
1、PsKill.exe
PsKill may be the oldest and most commonly used method to end processes in Microsoft Windows command lines. It was a tool in the Sysinternals
; echo this program will automatically clear the OfficeScan software in your system; echo. echo if your system not win 2 k pro or Win XP, pls use "Ctrl + C" to shutdown! Echo if your system is not Windows 2 k pro or Windows XP, use "Ctrl + C" to end this program! Echo. Echo !!!!!!!!!! Warning Message end !!!!!!!!!! Echo. echo. echo ver 1.1 (2004.09.17) echo. pause pskill ofcdog pskill pccntupd
think it over.2. Questions about the MSDASQL two requestsI do not know if you have tried to connect the remote database with MSDASQL, of course, this API must be SQL ServerAdministrator can only call, then the following:SELECT * FROM OPENROWSET (' Msdasql ', ' Driver={sql server};server=server;address=server,1433;uid=sa;pwd=;d atabase=master;network=dbmssocn ', ' sElect * FROM table1 SELECT * from Table2 ')When the number of Table1 and table2 fields is not the same, you will find that each othe
the SQL server administrator, as shown below:
Select * From OpenRowSet ('msdasql ', 'driver = {SQL Server}; server = server; address = server, 1433; uid = sa; Pwd =; database = master; network = dbmssocn ','sElect * From Table1 select * From Table2 ')
When the number of fields in Table 1 and Table 2 is different, you will find that the of the other party crashes and local connection fails, and the system resource usage is normal. after killing the sqlserver process with
*******************************************************************************
RCMD v1.03
Remote execution Script, by black hey Black
Welcome to visite www.xyhack.91i.net
qq:123230273 e-mail:cnhacker521@hotmail.com
Usage:
cscript D:\vbs\rcmd.vbs targetip username password
Then chose the command>
*******************************************************************************
Conneting 127.0.0.1....ok!
Now chose the command>
0.quit Exit Script
1.telnet remote on/off Telnet
2.3389 Remote Open 338
, upload n times, errors n times, silly n times, and then finally succeeded. Hackers really have patience and perseverance. )
Happy, we are still not satisfied, because this shell is too slow. So, want to use our most commonly used radmin, in fact, the administrator of a press Alt+ctrl+del, see the process can find r_server, but still like to use it, because it will not be killed. OK, upload admdll.dll,raddrv.dll,r_server.exe to H:\long\sun***\lemon, and then use the shell of the NC just to copy
times, errors n times, silly n times, and then finally succeeded. Hackers really have patience and perseverance. )
Happy, we are still not satisfied, because this shell is too slow. So, want to use our most commonly used radmin, in fact, the administrator of a press Alt+ctrl+del, see the process can find r_server, but still like to use it, because it will not be killed. OK, upload admdll.dll,raddrv.dll,r_server.exe to H:longsun***lemon, and then use the shell of the NC just to copy them to D:wi
Some commands are very common, but a period of time not to forget, the daily use of the collation down, the specific parameters used to write.
View Image: Display
View File contents: Cat/tail
View process: PSKill process: Kill
Find: Find
Vim Editor:Command mode:I enter insert modeCC changes the entire line to clear the entire line:. D Delete When moving forward: m,nd Delete line m to nth row: W Save: Q Quit Vim: q! Force exitIn the In
PsKill Msns.exe
echo "Kill Msns the virus that paralyzed the network ... jb51.net"
echo "shuts down process 10 ..."
echo "shuts down process 9 ..."
echo "shuts down process 8 ..."
echo "shuts down process 7 ..."
echo "shuts down process 6 ..."
echo "Kill Msns the virus that paralyzed the network ... jb51.net"
Attrib-h-s-r-A%windir%\system32\msns.exe
Del%windir%\system32\msns.exe
regedit/s./msns.reg
echo "shuts down process 5 ..."
echo "shuts down proc
,1433;uid=sa;pwd=;d atabase= MASTER;NETWORK=DBMSSOCN ', ' select * FROM table1 select * from Table2 ')
When the number of Table1 and table2 fields is different, you will find that the other side of SQL Server crashes, even the local connection will fail, and system resources occupy all normal, with PsKill kill the SQL Server process, if not restart the machine, SQL Server either does not start normally, or often illegal operation, I also just happene
operations to join the management group must be completed in shell;2. Enable IPC $ sharing for the remote host. Shared by default. Common shared operations must be completed in shell;3. Execute/Close the remote host service, which must be completed in shell;4. The process of starting/killing the remote host must also be completed in Shell (except in the case of software, such as pskill ).Commands that may be used during the 12th intrusionFor the inte
operations to join the management group must be completed in shell;2. Enable IPC $ sharing for the remote host. Shared by default. Common shared operations must be completed in shell;3. Execute/Close the remote host service, which must be completed in shell;4. The process of starting/killing the remote host must also be completed in Shell (except in the case of software, such as pskill ).Commands that may be used during the 12th intrusionFor the inte
The vulnerabilities mentioned here are vulnerabilities caused by Administrator configuration errors.
1. Set the directory permission properly. Otherwise, web users can browse any directory.
Tools: Web explorer http://blog.csdn.net/iuhxq/archive/2004/12/11/212987.aspx
You can use it to view any directory, as long as you have the permission. If you see conn. asp or web. config ....... Haha...
Otherwise, the database is downloaded (ACCESS... Check whether you have other vulnerabilities.
2. Do
command line utility is designed to capture process dump that is difficult to isolate and reproduce CPU peaks in other ways. This tool can also be used to create a process dump. It can monitor and generate a process dump when a process has a pending window or an unhandled exception.
Procexp: Find out which files, registry keys, and other objects are opened by the process, and the DLL files that have been loaded. This powerful utility can even display the owner of each process.
Procmon: monitors
, and the system resource usage is normal. Use pskill to kill
After the SQL server process, if the machine is not restarted, SQL Server cannot be started normally or the operation is often illegal. I just happened to find this bug.
This problem occurs only on msdasql, and sqloledb does not. It seems that the problem is not that the number of request sets does not match the number of returned sets, because
This is still the problem of msdasql. for spec
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.