Lucene search

K
myhack58佚名MYHACK58:6220066089
HistoryJan 05, 2006 - 12:00 a.m.

The use of the FTP server's vulnerability to find broiler-vulnerability warning-the black bar safety net

2006-01-0500:00:00
佚名
www.myhack58.com
15
  1. Scanning and determine the target

As the saying goes,haste makes waste,in the shortest time period crack shot to get a large number of broilers. You must first determine the presence of the FTP service host,this is achieved by the Scan to complete
FTPSCAN is a command line FTP weak passwords scanning of the specified IP segment in the Quick Scan there is FTP weak password host,speed and shape are great. Usage is also very simple!
Step 1:Go to DOS command line and then go to save ftpscan under the path 输入 扫描 命令 :ftpscan.exe 218.109.2.1-218.109.2.255 2 0 0 IP segment you can find yourself
That to 2 0 0 The number of threads scanning the network,218.109.2.1-218.109.2.255. See if there is a FTP weak password
Step 3:soon time to scan completion,the scan results at the same directory of the ftpscan. txt saved, open view,can see some open the FTP weak password host. These are our opening practice gun target

  1. AcknowledgmentFTP-servertype

Although we by just of the steps to obtain the presence of a large number FTP weak password of the host,but does not indicate they can be invaded. Because of theirFTP serverthe type is not yet determined. May be the Microsoft of the TP. Or WUFTP, etc.
While the US invasion when the use of the vulnerability serv-u FTP, so it must be for these there is FTP weak password host about the type of validation;
Step 1 will just scan the generated ftpscan. txt filter. All of the left IP. To each IP row of the rule storage.

Step 2 Open the superscan scanner. Tick the"display the host response",IP settings, select"Import file",然后 选择 保存 好 的 ftpscan.txt,and finally the scan port is defined in 2 1 on. After the completion of the necessary bar to start scanning.

Step 3:soon the scanning is completed. More shows be the scan hostFTP-servertype. As can be seen with a target hostFTP-serverof type:serv-u FTP

II. The invasion of the specified target.
By just scanning a series of steps. I have been determined to be under the target.
Following,start using serv-u MDTM overflow vulnerability to invasion.

Step 1:at the command line to run the serv-u MDTM overflow of use of the program killftp. Look to the Help file
Step 2:Follow the prompts. We enter the command:killftp 218.109.2.222 2 1 ftp ftp. I.e. of a IP of 2 1 8. 1 0 9. 2. 2 2 2,account for the FTP. The password for the FTP host to attack,
As can be seen,the prompts after a successful connection 8 1 1 1 port
Step 3:Follow the success tips. We use NC port program connected to the target host 8 1 1 1 port,enter the Connect command: nc-vv 218.109.2.222 8 1 1 1 soon be able to get a new
DOS window. And this window or administrator privileges. It’s that simple

III. The back door rotates to retain the broiler
By. Just the method into the internal server,but to keep the broilers,also really a little difficulty.
A is. Maybe it’s the dynamic I availability time to restart after it is lost,or is the other administrator is vigilant. Do not let you have the slightest left the back door of opportunities. So what do I do? I recommend a very good back-door tool to solve the problem, the web my pc is an automatic on-line remote management software. Would have been for administrators to remotely manage the host use,it has automatic on-line,connection speed,can be directly in the browser operation features. Does not require any external software. Just that broiler the presence of terminal server(remote terminal services). I’m very easy by connecting you into into the inner portion of the
The following in the graphical interface under the web my pc installed as the back door. Step 1:in broilers on the open web my pc the main program is set. First fill the login name and password,which need to be registered,because the web my pc is a company providing services,in order to use it,you must first register.
Step 2:Next, in the web my pc the main program, fill in the login name,password and other related information,is set up. You can start running. In the Run-Time screen The lower right corner of the taskbar will show its icon.
Step 3:in the lower right corner of the taskbar to display the icon on point mouse right key,choose"Install as windows service",so that you can the web my pc is installed as a system service. You can find the service:webmypc server. Its Startup type is set to"automatic"and start the service. So thoroughly will Service the installation is complete. Each subsequent time it will randomly start.
Step 4:in the lower right corner of the taskbar to display the icon very an eyesore. Very easy for the administrator to find,so it must be removed,the method is:Point"Start",“Run”,input regedit. Open the registry,
Enter the path to the HKEY_LOCAL_MACHINE\software\mirosoft\windows\currentversion\run will webmypc the start key value of the webmypc removed to the So it will not be in the bottom right corner of the taskbar shows the icon.
Step 5: everything is set up, you can login website: http://dns0755.netto fill out the application username and password to enter, and then click"self-service"project, where you can find on-line broiler. Name: the Black egg. So that you can remote control it.
So take advantage of this vulnerability as well as the introduction of the back door webmypc, can engage a large number of broiler and not worry about the broiler is lost, it is now.