Script Home
  • Dcomrpc invasion

    +Read more
    Author:zyq / Release:2013-7-30 / category:Hacking / crowd0 views time+ / sofa /
    The tools needed for: Good:  radmin. Exe Scanning tools: retinarpcdcom. Exe Overflow attack tools: RpcDcom overflow tools (gm) Script open Telnet tools: Telnet) vbe varies opentelnet. Exe resumetelnet. Exe Agent: sksockserver. Exe Backdoor: WinEggDropShellPro3thVersionOk, do about to do. Now ~ ~...
  • Have firewall intrusion process site

    +Read more
    Author:zyq / Release:2013-7-30 / category:Hacking / crowd0 views time+ / sofa /
    A, reconnaissance ping http://www.111.com found that timeout, can do it there is a firewall or a strategy. Sweep, reoccupy superscan to found a number of open ports, and a preliminary estimate is a software firewall. 2, injection search keyword asp from the source file, found an injection poin...
  • The RPC loophole invasion

    +Read more
    Author:zyq / Release:2013-7-30 / category:Hacking / crowd0 views time+ / sofa /
    RPC (Remote Procedure Call, Remote Procedure Call (RPC) is a kind of messaging capabilities of the operating system, Microsoft described as: "a kind of can allow different computers on the network of distributed applications Call services available messaging utilities. The computers during the Re...
  • Learning ASP script injection by hand

    +Read more
    Author:zyq / Release:2013-7-29 / category:Hacking / crowd0 views time+ / sofa /
    The Access query the database type http://www.zengke.com/product.asp? Sort_id=24 and the exists (select * from sysobjects) query table admin page to return to normal display, is wrong for free. http://www.zengke.com//product.asp? Sort_id=24 and the exists (select * from admin) query admin admi...
  • Invasion of a network game

    +Read more
    Author:zyq / Release:2013-7-29 / category:Hacking / crowd0 views time+ / sofa /
    Before the invasion, I have got once the shell of this site, but deleted, because not voluntarily took a again, just had the following process a: checking in gathering information because this is already the second invasion, so the specific information I have basically mastered 13 sites on the...
  • Safety inspection development website ASP.net instance

    +Read more
    Author:zyq / Release:2013-7-29 / category:Hacking / crowd0 views time+ / sofa /
    Today on a talent recruitment website, I am very interested in their recruitment system, aspx, ending seems..net program, this website can have what loophole? Open a message at http://www.cnwill.com/NewsShow.aspx?, by the way Id=4847 and then add a ' Look at what appeared? I'm dizzy. the Sou...
  • Friendship detection of municipal public security bureau website

    +Read more
    Author:zyq / Release:2013-7-29 / category:Hacking / crowd0 views time+ / sofa /
    Hi, this is god's love, carefree boring these days, just want to make the public security bureau's website, find public security bureau's website on the Internet, hey hey, eat something! the target station: use of tools: 1. The right and left 2. Big pony was going to make of, I am a want to not...
  • Teach you invade Internet server

    +Read more
    Author:zyq / Release:2013-7-29 / category:Hacking / crowd1 views time+ / sofa /
    Now, many Internet cafes have installed all Internet cafe management system, this system brought about by the convenience is obvious to all. However, the more convenient the greater the hidden trouble in security system, a lot of hackers have come up with a method of cracking the management syste...
  • Environment variable in the application of the Hacking

    +Read more
    Author:zyq / Release:2013-7-29 / category:Hacking / crowd0 views time+ / sofa /
    First of all, we first understand what call environment variable! Environment variables in general is to point to in the operating system is used to specify the operating system running environment of some parameters, such as temporary folder and system folder location, etc. This is a little simi...
  • Web page “black hand” to invade your Windows system

    +Read more
    Author:zyq / Release:2013-7-29 / category:Hacking / crowd0 views time+ / sofa /
    The popularity of Internet, make our world a better place, but it also has the unpleasant time. For example, when You receive a letter from the theme of "I Love You" email, excitedly double-click the attachment to see the the letter, "Love letter", but unwittingly become the victim of the virus a...

0Wide search 1Web Design 2Script 3Network Programming 4Database 5Operating system 6Network Security