Magic Hacker Archive

Chapter 7: The elves in the world float (2)

Views:

If people do not offend me, I will not offend others. If they do not offend me, I will offend others. If they deceive me, I will deceive others.

Even if it was me who paid my own life with a bloodshed, I would ask him to pay the price.

Just as Piao Piao was about to walk out of the Internet cafe, he heard a person behind him say; Xinxin, your rookie class left, you won't give it away.

Piao Piao glanced back at the person who was talking, and I really knew him. She was a fellow student of the same grade, Ma Yan, but this girl was really not very good, she was a bit bullying, and at the same time she was still a non-sister, that is, Tai Sister.

Another thing is to be with those bad boys who are not inconsistent. A girl, or a student at school, has been drinking and smoking. She said she had sex with several boys and had abortions. .. ..

It's just a little sister who has a computer at home and still surf the Internet. I don't know what she thinks, little prodigal lady...

Maybe I just want to be with these bad boys. In fact, everyone knows that she has a good mom and dad based on her own. Mom and Dad are government officials.

If his parents weren't government officials, the school would have expelled her a long time ago, and I heard Xinxin say; just leave, what to give

Besides, we are friends and don't need to send it. I just called her a rookie, but you can't call her a rookie.

But I tell you, if you call her a rookie again, I'll be anxious to ignore you.

Piao Piao glanced at Xinxin very gratefully.

Piao Piao is really happy when he comes home. He really seems to be a computer genius.

Otherwise, children at Piao Piao's age are rebellious and Piao Piao is thinking that I didn't offend you Ma Yan.

Then why use words to ruin me, aren't your parents a civil servant? What's so great.

I don’t believe that your parents are not corrupt or bribes, just as clean as that

I must find a way to check to see if your parents are greedy or not, whether they are innocent or not.

Piao Piao started her plan after thinking of this, but how can I find it out

But I am a student and can't follow her parents, hey! It's really troublesome.

At this moment, Piao Piao saw the hacker book he bought and smiled. He used hackers to hack into your home computer. Your parents' work is controlled by computers, so I started with their computers.

It took Piao Piao another week to read the hacker's book many times, especially the method of catching the broiler. Piao Piao is already very familiar, but he still has to go online to practice.

A broiler is like a chicken that makes people bald and has all the hair on its body. There is nothing to hide. It is really innocent and clear.

I practiced at the Internet cafe for a while. I didn't have so much time in the Internet cafe. Finally, I had no choice but to go to the Internet cafe of the school.

It only costs ten yuan to get an internet card at school for one hundred hours, but most students don’t like to go online at school because they can’t play games.

So few students come online, only those students who really want to find learning materials come online. But one advantage is that in the school network room, you can say one machine per student.

Piao Piao went to the school’s net room when she had no choice but to start her own broiler arrest.

So Piao Piao downloaded a basic broiler tool from Baidu Broiler Capture 1.3: a powerful vulnerability scanning tool.

A very good tool for beginners. It is mainly used to scan some basic vulnerabilities,

So Piaopiao uses a vulnerability checking tool: a very fast port scanning tool that can find the distribution of IP on an IP domain in a short time. Why use him

The main purpose is to avoid blind scanning and improve efficiency: the distribution of IP addresses on a certain IP domain is not continuous.

Maybe he has a computer for every IP from .50.255, but there is no computer for every IP from .51.0 to 100.255.

If you don't know in advance that there is no host at all in this paragraph, it will take a long time to scan and there will be no results, a waste of time and money.

Streamer.0: A well-known scanning tool, which also mainly uses its NT pipeline command function to connect to the target host, add users, and start services remotely.

"But Piao Piao uses Streamer 4.0 version. This is also the case of Piao Piao on the Internet and in the book, combined with his own comprehension (4) The window is used as the c: window under the system 2000: the window is used as the system 2000 command prompt tool. "

That is to say, the production of the springboard should at least be carried out under the above-mentioned working system.

Agent Springboard.exe: As the protagonist of the springboard, it is used to realize the framework 5 agent function of the remote host.

Global IP address allocation table: This is unnecessary for masters. The purpose of using it is to consider that many netizens who have not been a springboard before do not understand the distribution of IP, and the main target is foreign hosts.

Therefore, it is very important to have some understanding of foreign IP distribution, and it is also the main basis for us to choose the IP domain to be scanned in the future.

In this case, there is no need to use "hunting" software to find the actual location of the IP.

Now that the tools are ready, let's understand the general process of making a springboard. Note: The stuff you downloaded just now is not on your hard drive! Where should I put it? Put it on the "broiler"!

In other words, the process of making springboards is done on broilers. Term explanation Broiler: Broiler is a high-speed server with 3389 port Microsoft terminal service and weak password, commonly known as "broiler".

The reason for doing it on broilers is for safety reasons, because making a springboard is an illegal intrusion after all. We need to hide our tracks. Of course, we don’t want to use broilers.

The premise is that you have enough bandwidth and you are not afraid that the police will come to your door to trouble you.

We use the remote desktop to connect to this software to log in to the broiler, and we can use the mouse to control the remote server as we usually do on our computer to do what we want to do.

Process: For the convenience of narrative, let's assume that we already have a broiler. The following steps are all done on the "broiler" without special instructions.

First open the global IP address allocation table on your own machine and select an IP area.

Log in to Broiler, download the tools just mentioned on Broiler, just use Broiler's own IE to download it.

The main process is: first scan with a vulnerability detection tool: the selected IP area, find one of the areas where the IP is very concentrated, and then put it in the scan browser for vulnerability scanning

Find several IPs with weak passwords, transfer the proxy springboard to the target host, and then start the proxy springboard remotely. In this way, the springboard is completed.

Let's practice together and make a springboard: it is impossible to use a broiler as a springboard, especially for computers with dial-up Internet access. First, we must log in to the last known broiler: use the proxy springboard. Get ready for the stuff mentioned above.

It is best to place them in a centralized manner, which is convenient for us to use. Don't put it everywhere, otherwise the owner will know that someone has entered his machine as soon as he comes in.

Select the IP section 210.85.0.0-210.85.50.255, put it in the vulnerability detection tool, change the port setting of the vulnerability detection tool to only 80 ports, then confirm and start scanning.

At this time, in the output box below, there will be a large number of active IPs, can you see it? 210.85.0.0-210.85.40.255 are all active IPs.

Now we randomly choose an IP area, for example, the section 210.85.0.0-210.85.5.255, don’t be too long, because the next step is to put them in the scan browser for scanning. Scanning browsing, the scanning speed is not very fast, too If there are too many, it will reduce efficiency.

And if the IP area is too long, it may cause false positives in x-scan. The use of x-scan will not be described in detail here. What we need to do here is: in the "Settings" menu.

First select "Scan Module", select "Open Port" and "NT Weak Password" two options, in "Scan Parameters".

Fill in the IP range we just selected: 210.85.0.0-210.85.5.255, then, in the "port related settings", remove the original long list of ports.

Just fill in the two ports 80 and 3389, and use the default settings for the other settings, and there is no need to change them. Then start searching.

This will take you about 8 or 9 minutes, during which time you can do a little bit of your own other things and wait until the time is almost up.

Take a look at the results in the scan and browse: Okay, the passwords of N machines are empty, now you have a reward!

But what I want to say is that there are some false positives when scanning.

Randomly choose one from the middle.

For example: 210.85.0.14: administrator is empty. The next thing is to verify whether it accepts our connection and whether the password is correct.

Now that the streamer is used, open the streamer and select the "NT Pipeline Remote Command" in the "Tools".

A dialog box appears, fill in the IP, user name, and password just now, and then press Enter. Enter the command key behind the "command key>" prompt on the interface, the connection is successful, and the "command key>" prompt appears on the screen.

This proves that the username and password just now are correct, and this machine is basically yours. Okay, let's go in, think about what we are going to do

By the way, it is a springboard, and we will also put the proxy springboard on 210.85.0.14.

Only in this way can the service be started and this machine can be used as a springboard! How to put this stuff up? Call up the command button on the broiler.

Do the following at the command prompt: bc: command key to establish an IPC connection) O5 system prompt: command completed successfully Command key 210.85.0.14admin$ system prompt: successfully copied a file. This successfully transfers the proxy springboard to the target host.

The next task is to start him remotely.

Besides, in the NTCMD of the streamer just now, do the following at the prompt: c proxy springboard system prompt: 1949

System prompt: 1949c: Proxy springboard system prompt: The proxy springboard system prompts the service to start successfully.

At this time, this machine has become your springboard.

After Piao Piao made the springboard, he continued to find the broiler by himself. Tools: s proxy server: powerful proxy scheduling software.

Proxy springboard for remote control desktop

The link of the remote control desktop: the client program of Microsoft Terminal Services.

Used to land 3389 broilers. With it, you can control the terminal server like you control your own machine and do our things.

In fact, the first two are accessory tools, only those who really play the leading role. The proxy server and the proxy springboard cooperate to realize the use of the springboard, which can hide our traces of intrusion.

We do not have broilers yet, so everything can only be done on our own machine. If you are not at ease, you can go to the Internet cafe to do the following things.

However, I must remind you that you must not be a domestic host! Let's be Japan or Abian.

This does not violate our country’s laws, but also reflects our own patriotism, haha, but it’s better to be a springboard honestly and don’t always think about doing bad things.

The steps are actually very similar to making a springboard.

Piaopiao sets 3389 in the port for scanning, browsing and searching. If a machine opens port 3389 and has a weak password, then such a machine is a so-called "broiler".

But after all, there are too few machines with input method vulnerabilities, far less than terminal servers with weak passwords.

So we still chose the latter, and the input method loopholes are only suitable for domestic machines. It's a waste of time to experiment one by one! It will be annoying. If it is really not good to say, if you have not caught any broilers, you will let the school know.

Therefore, Piao Piao also knows that the specific search process is the same as in the springboard. He found a machine with a 3389 port service and a weak password.

We took a closer look at the results of the above search and finally found one: 210.85.2.84: Free Mail Privilege 41: Empty. And opened 3389 services. If you want to turn this machine into your own, you must have your own login name.

Otherwise, every time you always use someone else's, how can you call it your own machine? Let's now add a username for ourselves.

Elevate yourself to the basic authority, then we can do anything. Open Streamer, select "NT Pipeline Command" in "Tools" and fill in the username and password you just got: Free Mail Privilege 41: Empty.

Then confirm, enter the link interface of the remote control desktop, type in the prompt: CMD, after the connection is successful, do the following at the system prompt: c: link to the remote control desktop c: 788 (make the administrator's password 788) c : The link to the remote control desktop promotes the user administrator to the network administrator, that is, the administrator.

In this way, we have successfully obtained administrator rights on this machine and can do anything, but don't do bad things.

The next step is to use the tools we just prepared. Engage a few proxies on the Internet, set the proxy server and proxy springboard, drag the icon of the remote control desktop link to the proxy server, double-click the icon of the remote control desktop link, and fill in the broiler IP you just found : 210.85.2.84, then press Enter to connect.

After success, a blue interface will appear the same as when we usually log in to the window control system 2000, fill in the username and password we just added, and press Enter to log in.

After the login is successful, the graphical interface of the host will appear. At this time, you can be someone else's machine just like your own machine.

So far, Piao Piao has obtained a broiler. You can do what you did above.

These are simple things, but it took Piao Piao an hour or two. Piao Piao is already sweating, and his heart is pounding.

Although I have had the experience of hacking once, I can bear some pressure, but no matter how I say Piao Piao, I am still a novice. How can I not be nervous or afraid. It's fake if it's not nervous.

On the fourth day, the things Piao Piao wanted really came out, or the emperor could not bear the painstaking efforts.

It's really called Piao Piao and I found out this classmate named Ma Yan. His father is Ma Kui and his mother is Wang Lina. His father works in the People's Bank of China and is the chief of the credit department. Mom works in the Education Bureau as the chief of the personnel department.

Whether they have the right or the real power in their hands, it has been found that they all have corruption, accepting bribes and practicing favoritism. The amount of corruption, bribery, and bribery has reached five or six million yuan. This is still a small amount of preliminary excavation.

Since I know these things and these evidences, but I can’t report them, how can I make everyone know

"Hey!"

With me, I can publish it on the Internet, so that all netizens will know about this pair of worms.

So Piao Piao registered for a post bar first, published all the materials he had collected on the online post bar, and left the school computer room happily. In less than four days, it spread on the Internet and the inspection agency also intervened in the investigation.

As expected, Ma Yan's parents were evacuated and went to jail, and Ma Yan also told the school to expel.

I don't know what happened to Ma Yan later, but Piao Piao feels that she has done nothing wrong in this matter.

But Piao Piao herself did not expect that the procuratorial organs would find the school along the Internet.

In the computer room of the school, I found the computer that was surfing the Internet.

Everything you do will leave traces, not to mention on the computer, no matter how you delete it, it will also leave traces. Piaopiao was found all at once through the internet card.

The school's teaching department yelled Piaopiao. When the teaching department asked us, the classmate Piaopiao who confessed without thinking about it all admitted, and said everything about that day.

This shocked the whole school for the whole grade, especially Xinxin.

What Xin Xin didn't expect was that the rookie she often said in her mouth turned out to be a master of the Internet. It was terrible, she almost offended people.

Fortunately, one day she didn't do too much, or she would become a fluttering broiler. From then on, Xinxin was very cautious no matter where she talked, which made it scared.

After half a month, the school invited Piao Piao's parents to the school and called Piao Piao to the principal's office.

The principal ordered Piao Piao to drop out of school immediately. There is no room for relaxation. No matter how Piao Piao's parents beg, it just doesn't work. There is no way Piao Piao quit school.

This has led to the frantic revenge in the future, and it has also brought many, many things to the online world...whether it is disaster or luck is something to be said, we will wait and see.