Wednesday, February 16, 2011

Mistakes to learn and some people do not know a lot of common sense.

 Mistakes to learn and some people do not know a lot of common sense.
The first one errors
learning technology from the ipc $ hack invasion began. Ipc $ using the invasion.
This is definitely wasted a lot of people a place of time.
reasons: ipc $ connection is based on 2000 or XP. it does not exist in the 9X system. use of confined systems in 2000.
Why XP exists. The use of range There does not it?
our rights from XP to assign for us to open Control Panel from the
. in order to find Administrative Tools - Local Security Policy - Local Policies - Security Policy. in which to find ;.
Figure 1
default to pure XP is using this to verify the identity.
the assigned mean. remote users to connect to this computer, all the guest user permissions to review. in other words. no matter what permissions you set ipc $ connection . are guest privileges. This is all frequently asked.
ipc $ copy can be running the operation. guest is not enough. If you want a computer through the establishment of ipc $ for an invasion. then you need to in the hope that computer in the invasion. to change the assignment. Classic - local users to authenticate themselves.
however. I believe. .. If you can not do this, then you can easily change. ipc $ doing that also.
we look at the use ipc $. For XP . It is impossible for it. So why the 2000 version of the system through the establishment of the invasion it ipc $ connection?
This leads to large errors in the first 1, 2 of small errors.
xp sp2 firewall problem.
xp sp2 patch system played. will install the system inside a firewall. and this firewall. to prevent the remote user on the local 139 135 445 high-risk access to ports. so ipc $ on xp sp2 and it does not turn off the firewall in the computer. is totally impracticable.
.2000 system, but there is no default firewall. so it can ipc $ to the tunnels.
Summary: If the system is shut down the default XP sp2 firewall. and in the security settings which set the situation can be described as a unique tool in the, ah D network toolkit, windows automatically attack device ah. Like the kill into their hands. or a full day to hang x-scan scanner swept the so-called broilers. < br> In fact, this is a learning obstacle.
Reason: ah D, looking for broiler function. only through large-scale search for These machines must be the system or is xp 2000 no firewall system. This also limits the so-called too few opportunities point of the bar. is simply a waste of time thing.
device that windows automatically attack it?
it is just one more D than ah sa weak password scanning. use it where the person is not necessarily wise go. now never used this tool to friends an experience.
sa really be able to find weak passwords server. But more than .9 as the key to something inside the machine to be removed by xp_cmdshell. that is. you hard to buy to the house. but can not live inside. can not run inside. execute the command inside.
very foolish to do so is not it?
errors 4:3389 with the new account
many beginners prefer a wide range of The scan for open Terminal Services computer. and then use the new + empty password login.
This is a ridiculous misunderstanding.
reasons: XP clean installation CD after the installation of the system. is not added except administrator and installation user-defined time. that new users in XP system does not exist.
then the new come from it?
D version currently on the market a wide range of system disk. of the source also vary. but the content is nothing but pure by XP installation CD for the changes. Some joined a number of commonly used inside the software. Some removed the closure of some services and components. but some CD-ROM. produced automatically by special installation features. automatic partition. automatically load the driver files. automatically installed.
the XP installation CD in the implementation of the final step. Add the administrator's time. the sake of convenience. directly add a name for the new user. mounted over friends all know the system. add an administrator. there is no password set. need to manually change back to the system inside. so it appeared. this classic misunderstanding. new + empty password login 3389.
Error Summary: Terminal Services is not The default open. but these computers because of various reasons (mostly in the Trojan) leads to open 3389. the connection is only one default user 3389. That is administrator + empty password. If the password is not correct. so is the other side set the admin's password. and then continue on the new to try. because there are new this user's machine. a few.
Mistakes 5:2000 with XP's Terminal Services connection problems.
more suitable as a graphical control of the people. So many new users want to have a Terminal Services broiler. So all day hanging scanner scan contains the IP Terminal Services section of weak passwords. hard for so long. finally found a station XP. excited to open mstsc. .. happy landing up less than 5 seconds. to be disconnected ... .. no longer the most depressing is that Rom had. This is the classic misunderstanding of the number of user login problem 5.XP.
reasons: the beginning from the 2000 system. windows started multi-user. multitasking support. but the real multi-user simultaneously. is 2000server system begins. That is how the user support system, while .2000. but does not itself contain user switching. need to log off a user can visit other a user control. but 2000server different. entirely through Terminal Services. to carry out local and remote operation of the computer and have access.
which identifies the Terminal Services 2000 Professional can not be achieved. (2000 Professional where there is no Terminal Services installation)
This also created a said. If the person has a user login. your landing. will lead to the other side was forced off the current session. So, a little bit of common sense knows what happened. even if he did not know. will once again landing system. brings you T down .. note br> Myth # 6: gray pigeons on the line.
visit to China all engaged in security forum. can find such a problem: how to use gray pigeons ah. how on-line ah. Which master to be a tutorial ah.
this questions and more to the beautiful. way out of. will lead out. ah on the line, ; Ge Army range. need each other to accept the firewall to allow remote access to the port. and each other, and your connection without routing or other obstacles.
said the port is directly connected. If the other party and you are not the same LAN next. or the other machine does not log in directly to the Internet for the (by the switch. routing or other shared access to the network conditions are considered) then the positive connection is not directly implemented. This requires a term we often see pigeons in the process. to because they do not understand the principle of automatic on-line. will make all kinds of bizarre problems.
automatic on-line implementation of the principle as: Trojan program by visiting the local fixed network. to obtain the host's connection. If the host network address is not fixed. (commonly known as dynamic IP) then the horse should be in the configuration time. selection can turn to the actual address of the host domain name or other network configuration tag.
we commonly used. black Anti-crack version of how to achieve the following principles pigeons do?
Speaking from the configuration. We see gray pigeons server configuration at the most critical. Fig .2
we will look at the next instructions. Figure 3 < br> In principle, we can see that. If your IP fixed. write directly on the line to set a fixed IP you can.
applications: for example you want to control in a cafe inside the same Internet cafe computer. then you IP can be viewed as fixed. trojan directly connected to your IP on the line. But if you change computers. This configuration not work. because your IP changed. Trojans will not have access to .. but If you configure the IP back to before the IP. and forced to write off the original computer address .. can also be automatically on the line. hard to see. The small range of applications.
if not fixed IP? you need to to find ways to connect our local pigeons to a fixed sign. In short, is to let it know where our IP. and made contact with us.
Here we have to do in Figure 3 shows details of operation .
1.DNS on-line first principle: the Trojans on DNS resolution. in order to find the address he should be on the line. to achieve the control side to our connection. the next time on the line. as long as the local updates to the DNS on the IP. to fully automatic on the line.
we can set up a local IIS service. below to XP SP2 + peanut shell as an example Dynamic DNS .* (Note the local network adsl dynamic IP)
as Figure 4. This is the most critical step
configured DNS on the line graph of my address I wrote to apply for free dynamic domain name peanut shell. As long as I landed on the peanut shells on the local IP updated automatically. Figure 5
so easy to Trojans bounce on the line. From the figure. hard to see. I applied for 3 free domain names. that. trojan can connect any one domain name to find me. When I changed the IP post. peanut shell landed again. He will automatically update my IP to the domain name on the .. so any setting is no longer required to automatically on-line.
first 2.ftp principles on the line.
Trojan on
below to www. chaokuai.com the free and the FTP support asp + ftp FTP space to explain the on-line.
skip the process of application for space, skip to the end of this generation services.
Fig.
the file for me The IP access address. If the content of this ip.txt written in the following format:
221.194.59.175 my current IP. so that when I configured when the Trojans. fill in accordance with the plans directly to resolve the address to connect automatically on-line the.
Trojan will read the file information. never get a connection with my machine. Some Cai Cai .. next time you asked the IP changed. how to do? directly in FTP in the ip. txt file contents replace the current IP on it. now. You have to understand why support for http to support FTP space, right? ftp for file transfers. http is to allow horse access to our ip.txt file . If your space does not support one of them. as long as you can make access to the latest ip.txt Trojan files. is the same on the line can be achieved automatically. do not necessarily need to FTP to update before they can. map file to the FTP update The principle of space is through ftp service to transfer the ip.txt file space. but we have to manually modify the IP file to be updated. and this is through the the principle of automatic on-line. Trojans have many comrades could not handle a rebound because of unclear and blindly look at the so-called principle of the automatic on-line tutorial makes their loss. led to 10 days, two weeks later. or play will not.
Error 7:
on the above principle of association. If you can think of several issues below. You can say that you already have a certain temperament of a hack. because the hack is to learn by analogy. divergent association thing. < br> 1. rebounded Trojan after all, is it needs to parse out the connection through the ip. to automatic on-line.
2. positive connection is to open a port broiler. waiting to be connected. The reverse connection it? is to the local open ports. so bring chicken to connect to us. so. If we are within the network, then? chicken how to link to us? you think. assume that we are chickens. then people need to connect to us. If we intranet words. others are not looking to us. Even if the updated IP. is only updated within the network of IP. the middle of transit routes or other devices. So. the net is not automatically on the line. then this leads to confusing to many rookie errors ------see us. If they want to get in touch with us. We can room with the pipe with a. connected to the outside world. so. outsiders can, through the tube. to be connected to us. In fact we are still in closed room. We have not changed their position. change is: We connected the channels with the outside world open.
we use this mapping under real terms how is it in the end.
Figure
I BluesPortScan *.*. 221.110 of this IP has been scanned from 1 to 12345 ports. only the tips open port 12345. and this port. after I modify the invasion route for remote web management port.
good. premise environment to introduce here. We first summarize below a few clues.
1. The route had to stop behind the outside world and routing all ports within the network computer access.
2. only open port 12345. there is no services. Even including a computer network. opened the pigeon. and updated ip. Trojans still can not find a route through the control side of his gray pigeons open port 8000.
so if I want in on this net, still on the line with the automatic function pigeons, how to set it?
idea is this: pigeons to automatic on-line. need to open our local port 8000. And because we are in a closed environment within the network . Our 8000 port is not an outsider to know. Therefore, we have mapped out this port. so people can access through a pipe into our computer's 8000 port within the network. The pipeline is the port mapping.
following an integrated remote management The TL-R480E port mapping routes to explain the role in the internal network as shown in Figure

route is a certain Internet cafe management web. We are the rules by forwarding function of the routing within the network .. will be successful in 192.168.1.101 port 8000 on this computer to the outside route.
so. Let us first the next they want. We should be how to configure the server on the line dove it? address how do we resolve?
If You do not understand. to go along with my thoughts: pigeons to on-line, need to find our address. We intranet.'ve made the local 8000 port tube. connected to the back outside, then dove from the long management in the coming. to find us can be achieved.
so. configuration time. to import the route of the IP network on it. because the route has been opened on port 8000. and this leads to our internal network port machine's IP. So when we configured the services segment. and others point out later. will be directly on the line. .. because the IP is fixed, so there is no update IP one said. (why IP fixed it? .. Because the test is done in Internet cafes.)
cafes route map on the principles mentioned here. just because such a simple thing. so many new users confused for a few days ago. We want to understand this principle. it is easy figure out other ways the.
Here another kind of situation: we are within the network itself. no way to control the routing. or not to share Internet access with a NAT environment. this time we should be how to map it?
analytical conditions : 1. can not control the routing
2. within the network itself. We can not connect to the outside world.
these conditions. our own network can no longer help us. so we must rely on 3rd party network environment .
we do the following assumptions. we are within the network itself. But if we have a chicken outside the network 3389. We are not directly used in the broiler on the pigeon do?
the answer is yes. but. is few people use 2000server 3389 or 2003 system and open .. so the chickens had become very difficult to find. If the local network environment and the system allows the network through the D ah kit to find some weak passwords computer. then we can come through these computer to do port mapping. but. These users are basically dynamic IP. the next time the address change. We will no longer be found. broiler will not fly back .. this time the situation will be very depressed with BT's .. Port Mapping tool is also true of the principle. So we have concluded:
If you need to do port mapping. mapping at least a fixed IP host.
Here we have a chicken as an example explain how to do port mapping. because there is no make presentations at a fixed IP of the chicken. We assume that the chickens to a fixed IP.'s look at how to use chicken wire to do the online.
version I used comes with gray pigeons 2006VIP port mapping tool. do the demonstration. go to the official station to download the latest version of the VIP www.huigezi.net pigeons. We only use him inside a small port mapping tool. is this.
look under the program's interface.
Fig. We explain in detail about the specific role of each configuration vport
first server IP here. we write a fixed external network IP's broiler. mapped ports. we default to 9999
second map settings: remote port 8000. mapped to local port 8000. (Note: Because I have opened up the local port 8000 for the pigeon service. so I wrote 8888)
Article 3. map port 9999 to start automatically. have a good Tim. We build server . generate a good server. We reached the chicken run. on it.
this principle under the following terms and instructions for use:
1. Vport What? Vport is open ports on the broiler. by This mapping tool . will run through the broiler just that server. the automatic route. transfer language to describe the purpose is this: When a person with a mapping tool to connect my 9999 port. And I feel the port from 8000 information back to the man's 8000 port.
This time no see? that. Our Trojan. is connected to port 8000 chickens. But chickens do not normally open port 8000. When we use mapping tool 9999 port connected to the chickens when. it will open the 8000 port. trojan information received. and feedback to the 9999 port with his back to where we do?? is fed back to the top of our local here ... like 8000 . our local open pigeons. and use port mapping tool. connected port 9999 chickens running horse who we are configured to automatically shown on the line.
through the graph we can see. Vport the chicken I chose is 221.194.57.95. broiler open 9999 port to let me connect. and with the system automatically. When I ordered a the information. back to the people connected to it ------ 9999 port is me. so. When I dove out of the local 8888 port to the time line. pigeons to come. because I have opened port 8000 pigeon service. so do the opening presentation 8888. when you configure the Trojans. You can do this operation. but. If you stop 8000 port is already in use. then they would consider replacing the on-line port. and the local pigeons open port. Fig.
If you stop here. There are people ask me how the internal network with pigeons. the key place to grab a map to your right.
IP to write directly to chickens. port to see your actual situation. Other to have nothing special to note. Just write on the IP and port. There is no reason not on the line ..
however. If you on-line via the network map. on the line when the IP would be 127.0.0.1 of the . rather than your actual internal network IP. all the chickens are like this. may cause great trouble. and. the most critical. If you lose a fixed IP in the broiler. Your chicken will all lose. so. within the network Trojans rebound users or less. spatial instability of users. have less. space update on the line. The best is to do their own updates with peanut shells. This stable than FTP. because of uncertain day. stop your FTP space . you're stupid!.
good. wasted thousands of words and then dove face online within the network and the outside .. no way. Who He is the Trojan groups of users to do the most. write clearly, then you will not encounter to the problem. any rebound Topsy the Trojans can.
9 the following errors to be written. hope you have in front of eight errors the same mistake will not happen again. The following content to the efficiency of the Forum for questions answer.
ninth largest school hack technology and backdoor
errors ------ hacktools hack a lot of people new to the term of the time for it. always go back and download some black soft back. to find that anti-virus software alarm. He XX's. black base stations where there are viruses. So curse the sea meal to the forum. found a few hours. your ID missing. forums login does not go up.
the old saying: gradually forgotten. so it caused. master hacked by rookie joke! also created this topic. Hacktools and backdoor
Hacktools: is hacker tool. Why is a tool to be called into a hacker tool? because he offensive. or will cause some computer users to the threat of attack. So are anti-virus software as reasons. But with the development of network security. Many people like to bundle in the tools inside the back door of their software. such as bundles of a dove. or other Trojan rally. Let us keep track of. antivirus open it. just download the finished. to turn off the light of the .. killed it ... not safe. How should we do in capability among the two? This leads to the theme of this myth and backdoor
us ------- hacktools Kabbah 5.0 + 06.8.11 to date with the latest virus definitions to combat under analysis. What is a virus. What is the Trojan horse., what is the back door. what is harmful things.
first. we need to know some of the most basic. What does the name of the virus have a look?
anti-virus software too much from the name of the virus. In order to facilitate the anti-virus software for their classification. tend to have the name of the virus to do the following processing. . < Virus Name>. . For us there are several common
1.Backdoor. the back door of the mean. the role of general. is to give the intruder leave a own dedicated landing entrance. to control the computer. and as I said before the Trojans feel positive about. But now the popularity of Trojans rebound. More and more anti-virus software has to rebound Trojans, and other remote control software. were to use the backdoor named. Fig. This Kabbah on my memory with the naming of pigeons (pigeon I have run the server)
Fig. We should draw the following conclusions. Backdoor is definitely an impact on the system for viruses. Therefore, we can not just go operation. or you could be someone else remote control. We look at this picture below. This is a special edition of black anti-gray pigeons were generated by the scan server. By comparison, we can see the obvious: in memory. and generated. are the backdoor This explains. Backdoor insecurity. so. When our anti-virus software detected a backdoor when the software is. we must first look at the location of the software. as well as its function. If simply corresponds to a server. That is normal. If the corresponding is the control side. it shows that it passes through the bundles. this time. We want to remove. or does not run this file.
2. system of the virus.
system virus prefix: Win32, PE, Win95, W32, W95 and so on. The general public of the characteristics of the virus can be infected with windows operating system *. exe and *. dll files, and through the dissemination of these files. such as CIH virus.
From the figure we can see. Backdoor.win32. is a joint prefix gray pigeons. that. It also found two viruses out Kabbah. so this thing is very dangerous. The system viruses . The most classic is called and hacking tools.
Trojan horse: English name is Trojan. hacking tools. English name: hacktools
online now have their very much more out of the points. long time ago. trojan and backdoor the feeling that the same. is to invade with. now more used to steal passwords. keyloggers. And hacktools the name suggests is to help aid in hacking others. For example streamer. Some anti-virus software, put him hacktools judge. Some judged him to be Trojan . we use these things in time. to be very clear to his role. we can make the right judgments!. For example Trojan.QQ.PSW .. this is to do more stolen QQ virus. Password is the password of the mean. PSW is referred to as . QQ or OICQ I Needless to say the bar. in many cases. The virus is able to guess what their own.
4. binding machine binding machine virus virus
prefix is: Binder. the public properties of this virus the virus will use the specific binding of the virus with a number of process applications such as QQ, IE tied up, the surface is a normal file, when users run the bundled virus, it will run these applications on the surface, and then hide the run bundled with the virus, which cause harm to the user.
present. There are many free online tools to kill the bundle. Soft.hackbase.com which regularly update the software. So too for the bundled tools. We want to improve safety awareness. antivirus software alone can not get the. on the binding problem., we will introduce in a future article.
is often more than four and we interact with the virus file. in fact know. but that makes us more understanding anti-virus software and the struggle between hacktools. no need to name all those memories down the virus. Remember: security is awareness. rather than tools. If you have a conscious to protect their own safety. a system without any patch. is still not been compromised. This is for those who like to patch the PC said lesson. No amount of patching security awareness is not as important..
classic rookie errors 10: safety awareness and anti-virus software
If the overall point of this topic last 3 days .. that would not be enough. safety aspects, including too much. As a fledgling rookie. so you have a security expert than the United States more sensitive awareness of prevention is not necessary . We need to know. just. How is security. How is safety. What is consciousness. consciousness and which is more important than the software. these questions understand. I believe you will know everything safe!.
With the popularization of network security. more and more people to their own anti-virus software installed on your computer. No anti-virus software on the Internet are beginning to find some free anti-virus software. all kinds of hack or registered putting Edition and so for us. But when we happily after the installation of the software. Update to the latest virus database later. do we really safe?
lot of people think. antivirus security firewall software = = Let us safe. fact. This is a ...

No comments:

Post a Comment