Script Home
  • Parsing the port 445 invasion of reason

    +Read more
    Author:zyq / Release:2013-11-8 / category:Security Settings / crowd0 views time+ / Comments Off on Parsing the port 445 invasion of reason /
    Detailed 445 port invasion Content on the " 445 port invasion" Detailed 445 port invasion Site Search more about " 445 port invasion" of content 445 port invasion , before our first look at why the 445 port or port it back to become invasive ? Default port is 445 IPC services ipc $ A summary Onli...
    445 port port 445 invasion
  • Invasion of RedHat Linux system

    +Read more
    Author:zyq / Release:2013-7-30 / category:Security Settings / crowd0 views time+ / sofa /
    Assumption is: http://www.fbi.gov.tw. ^ __ ^Let me see if scored on:C: \ ping http://www.fbi.gov.tw Pinging http://www.fbi.gov.tw [202.106.184.200] with 32 bytes of data:The Reply from 202.106.184.200: bytes=32 time=541 ms TTL=244 The Reply from 202.106.184.200: bytes=32 time=620 ms TTL=244 The R...
  • The analysis of system leaked password invasion

    +Read more
    Author:zyq / Release:2013-7-30 / category:Security Settings / crowd0 views time+ / sofa /
    Windows access port 139 automatically when the connection with the current user, password, causing leak user passwords, while the password is encrypted, but the same can be used to attack. here are the SMB password authentication. WINDOWS 139 access to the process of the direction of the arrows...
  • Learning website using file contains loopholes to invasion

    +Read more
    Author:zyq / Release:2013-7-30 / category:Security Settings / crowd0 views time+ / sofa /
    A, see vulnerability announcement recently wanted to learn file contains loopholes, inadvertently saw the statement on documents contain loopholes. Mean is roughly such, PhpwCMS 1.2.6 system the following documents of the file contains: include/inc_ext/spaw/dialogs/table. The PHP include/inc_ex...
  • Invasion of Linux system instance

    +Read more
    Author:zyq / Release:2013-7-30 / category:Security Settings / crowd0 views time+ / sofa /
    I found a website, so conventional invasion. Is very good, it the FINGER open, so I made up a SHELL and aaa account try to ZZZ (by the way, this is the order of one I found online, it is the intensity is proportional to the length of the account and password, if an account is only two or three lo...
  • Buffer overflow analysis

    +Read more
    Author:zyq / Release:2013-7-30 / category:Security Settings / crowd0 views time+ / sofa /
    1. Introduction I see Lam3rZ team on http://www.hack.co.za/Kil3r write one for redhat 6.1 (and others)/usr/bin/man exploits, download after you come back, run directly compiled, and not completed. Notice the original exploits are written according to non-executable stack environment and my test ...
  • About VBS role in Hacking –, Inject SQL application

    +Read more
    Author:zyq / Release:2013-7-29 / category:Security Settings / crowd0 views time+ / sofa /
    We usually have a injection vulnerabilities category site most of the people is to use NBSI injection tools Or o D. But some site of the injection point is difficult to construct, or injection statement more specific. If by hand to injection, time-consuming and laborious! But to write their own s...
  • Complete XSS wrom invasion site demonstration

    +Read more
    Author:zyq / Release:2013-7-29 / category:Security Settings / crowd0 views time+ / sofa /
    XSS wrom website how to realize the invasion? Don't say nonsense, and how to achieve it, I'll take SOHU BLOG to do demonstration.1. Test filtering characters, the following are key tectonic XSS needed characters (not contain full Angle character, the blank space is a TABLE, before \/is the real s...
  • Superior analytical invasion of 3389

    +Read more
    Author:zyq / Release:2013-7-29 / category:Security Settings / crowd0 views time+ / sofa /
    Tools: automatically attack of WINNTAutoAttack sweep (holes); SQLTOOLS (SA hollow connector); 3.0 Chinese version (remote control) RAMDIN shadow (RADMIN registration code: 08 us9a95i lKa9nbOLXqv0V8xqdDvKGcNcTpN2wV11iSqOCVuA 6 a5kkzrhc5gvmiybwomk6rnwoj8myy8lxrfi23); SC. Exe port. Bat query. Exe q...
  • Three minutes hidden administrator account

    +Read more
    Author:zyq / Release:2013-7-29 / category:Security Settings / crowd0 views time+ / sofa /
    The regedit. Exe are familiar, but not items button to set the permissions on the registry, and regedt32. Exe's biggest advantage is to be able to button to set the permissions on the registry entries. Nt/2000/xp account information are in the HKEY_LOCAL_MACHINE registry key, SAM, SAM, but in add...

0Wide search 1Web Design 2Script 3Network Programming 4Database 5Operating system 6Network Security