=" wkiol1pqgnyz2roaaaltn45w0678.gif "/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/41/08/wKiom1PQgbbAaEu5AAAKDmWaZa4106.gif "Title =" qq20140724114643.gif "alt =" wkiom1pqgbbaaeu5aaakdmwaza4246.gif "/>
2) use the vulnerability exploitation program to operate on 2003 with 2008 (2008ip: 192.168.200.130 ):
Run the command in the format of nc ip 3389
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/41/09/wKioL1PQhX2hP0X
mobile operating system, such as Android.The RDP server is installed on the Microsoft operating system and receives requests from the client proxy. The diagram of the published application or remote access to the system itself is displayed. By default, the system listens to connection requests from clients through RDP on port 3389.What are the most common method
One. HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default
The right to display, not the original IP key value directly del on it ~ ~ But remember that the default registry is open, the current key is where (generally is the primary key, no tree), according to the default when the tree-like appearance of the Restore on OK
Two. Another method
XP and 2003 under
Reg QUERY "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal server\winstations\
\ CurrentControlSet \ Control \ Terminal Server \ winstations \ RDP-TCP"
Reg query "HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ winstations \ RDP-TCP"/V portnumber
Another tips for reading 33891. General methodsRegedit/E c: \ 3389.reg "HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ winstations \
RDP (Remote Desktop Protocol) is a multi-channel protocol that includes client AV transmission, file transfer, and communication port steering and so on, and the data network transmission via compression is also fairly fast. We use the mstsc.exe, which is often used under the Windows operating system, and also provides the interfaces that COM component calls.You can create a WinForm project that adds a COM control through the Toolbox, Choose Items.↑ Y
/system/currentcontrolset/services/termservice/ Parameters The key value, remove the certificate key value, and then restart the server directly. The server automatically creates the key value after restarting.
But I think this method is not a cure for the symptoms! If someone sweeps again, does it still cause such a situation?
The insurance point is to modify the server remote port, because you generally rent or hosted the server, the computer room to do the system to you are using the defaul
This morning, the remote connection win, prompt unable to connect to RDP server, yesterday also good, how suddenly today, Telnet win 3389 port, is through, with Remina Remote Desktop Client connection Other win is normal.With other connections in Ubuntu can not connect to win, also normal, it seems that the Ubuntu configuration problem, Google, finally found a solutionVim ~/.freerdp/known_hostsDelete the un
RDP is a connection-oriented transmission protocol designed to effectively transmit a large number of data for host monitoring applications such as download/upload and remote debugging. RDP attempts to provide only the necessary services to achieve effective operations and a small scale. Its main functions are as follows:
RDP provides a full-duplex communicati
Vulnerability Name: ms12-020 Remote Desktop Protocol RDP denial of Access vulnerability
Condition: The victim must open the RDP protocol open port 3389 or port changed, know the opposite of RDP open port.
1.nmap Scan for a host with 3389 ports open in a network segment
Next, let's look at how to prevent hacking by modifying the default port.
As we all know, remote Terminal Services is based on port 3389. Intruders usually scan the host open ports first, and once they are open to port 3389, the next step is to invade, so we just need to modify the default port to avoid the eyes and ears of most intruders.
Step: Open "Start → run", enter "regedit", open the registry and go
Copy the following code and save it as a batch file. Then double-click it!
Copy codeThe Code is as follows: md c: \ WINDOWS \ PDPLOG
Echo date/t ^> RDPlog.txt> C: \ WINDOWS \ PDPLOG \ PdPLOG. CMD
Echo time/t ^> RDPlog.txt> C: \ WINDOWS \ PDPLOG \ PdPLOG. CMD
Echo netstat-n-p tcp ^ | find ": 3389" ^> RDPlog.txt> C: \ WINDOWS \ PDPLOG \ PdPLOG. CMD
Echo start Explorer> C: \ WINDOWS \ PDPLOG \ PdPLOG. CMD
: Add an IP address that is automatically record
RDP man-in-the-middle attack
Almost all networks use Remote Desktop Protocol (RDP), which allows users to remotely manage windows servers and have full control over the server desktop. Some users also like to use it to schedule or install applications, and some like to use powershell to quickly and automatically manage the system.
Now, the question is whether there is a way to directly intrude into
The following code is copied to save into a batch file and then double-click!
Copy Code code as follows:
MD C:\WINDOWS\PDPLOG
echo date/t ^>^>rdplog.txt >>c:\windows\pdplog\pdplog.cmd
echo time/t ^>^>rdplog.txt >>c:\windows\pdplog\pdplog.cmd
echo Netstat-n-P TCP ^| Find ": 3389" ^>^>rdplog.txt >>c:\windows\pdplog\pdplog.cmd
echo Start Explorer >>c:\windows\pdplog\pdplog.cmd
:: Add users each time to enter the Remote Desktop automat
ARP deception plus sniffing, playing black friends will not be unfamiliar, we play the most is in the same network section sniffing FTP password, so generally like to infiltrate the main station open an FTP, but more time is the main station open 3389 probability than ftp big bar, if can directly sniff 3389 wouldn't be more cool.
Cain is a familiar software, with ARP spoofing sniffer and password cracking
Introduction to port 3389:Port 3389 is the service port of Windows 2000 (2003) Server Remote Desktop. You can use the remote desktop and other connection tools to connect to the remote Server, after you enter the user name and password of the system administrator, the remote computer can be operated like a local computer. Therefore, the remote server generally changes or closes the port.
How do I modify a p
ARP spoofing and sniffing are not unfamiliar to friends who are playing black. The most popular method is to sniff the FTP password in the same network segment, so they generally like to penetrate the main site to open an FTP, however, in most cases, the probability of the master site opening is greater than that of FTP. It would be better to sniff 3389 directly.
Cain is a software that everyone is familiar with. It has the ARP spoofing, sniffing, an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.