Home > OS >  Remote control of offensive and defensive/attack
Remote control of offensive and defensive/attack

Time:11-28

Posting (new bosses don't spray )
In the Internet, use of a computer's remote control another computer technology,
The principle of
Send a remote control request
|
|
Verify through - no - can't
|
Is
|
A successful implementation
Common categories
One-to-one:
Refers to a the at the same time only one remote control a computer remote control program design mainly is a client/server mode, the concrete is mainly used in the remote computer monitoring and control requirements,
One-to-many:
Refers to remotely control multiple computers at the same time, a pair of remote control more than one remote access to powerful, can carry on some simple control, such as timing charge supervision

Main application:
A: IPC $invasion
Enabled by default in the ipc $share through Windows system to achieve the purpose of invasion of the target machine, so as to gain control of the target computer, but the invasion of a condition to be met, that is already known target computer administrator account and password information,
Methods the following
Enter the CMD interface first, and then type the command, the command is,
Net use \ \ \ IP address the ipc $" 123 "/user:" John "
CMD interface will then give you the success of a prompt,
2: Telnet invasion
This technique can be directly took control of the target machine,
The method is as follows,
CMD input interface IP c connect command, then right-click the computer command on the shortcut menu, click on the management, the computer management window, in the top menu bar click operation, in turn connected to another computer command, then according to the prompt to complete,
Beginners don't spray a

  • Related