大家好!我叫:H I V也和大家一样是一个菜鸟下面我要讲的是如何入侵!
如果有您有更加好的经验请你留言!
首先我用的工具有:
SuperScan203 很有名的扫描器 在www.20cn.com有下载..
流光2001 不用我说了吧! 也是在www.20cn.com有下载..
追捕1.70 网络新手必备的软件在www.20cn.com有下载..
首先要打开:SuperScan203
开始设置SuperScan203
添入你要扫描的IP
从:61.176.59.1
到61.176.59.255
不要扫描太多会很慢!
然后决定主机名字上打挑..在选仅仅扫描/显示PINGDAO到主机
选择列表中全部被选中的主机
然后开始........
先抽根烟....你有烟吗? 要是没有找我来要!
大概半分钟扫描结束 扫描结果:
* - 61.176.59.1 [Unknown]
* + 61.176.59.2 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.3 [Unknown]
|___ 21 [ftp] File Transfer [Control]
|___ 80 [http] World Wide Web HTTP
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.4 [Unknown]
* + 61.176.59.5 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.6 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.7 [Unknown]
* + 61.176.59.8 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.10 [Unknown]
* + 61.176.59.12 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.13 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.14 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.15 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.17 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.18 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.19 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.21 [Unknown]
* + 61.176.59.22 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.23 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.25 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.26 [Unknown]
* + 61.176.59.27 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.28 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.29 [Unknown]
|___ 21 [ftp] File Transfer [Control]
|___ 23 [telnet] Telnet
* + 61.176.59.30 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.32 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.33 [Unknown]
* + 61.176.59.35 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.36 [Unknown]
* - 61.176.59.38 [Unknown]
* + 61.176.59.39 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.40 [Unknown]
* + 61.176.59.42 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.44 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.45 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.46 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.48 [Unknown]
* - 61.176.59.49 [Unknown]
* + 61.176.59.55 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.58 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.60 [Unknown]
* + 61.176.59.61 [Unknown]
|___ 23 [telnet] Telnet
|___ 80 [http] World Wide Web HTTP
* + 61.176.59.62 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.63 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.64 [Unknown]
|___ 21 [ftp] File Transfer [Control]
|___ 25 [smtp] Simple Mail Transfer
|___ 80 [http] World Wide Web HTTP
|___ 139 [netbios-ssn] NETBIOS Session Service
|___ 443 [https] https MCom
* + 61.176.59.70 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.71 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.88 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.91 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.92 [Unknown]
|___ 110 [pop3] Post Office Protocol - Version 3
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.93 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.97 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.99 [Unknown]
* + 61.176.59.107 [Unknown]
|___ 21 [ftp] File Transfer [Control]
|___ 23 [telnet] Telnet
* + 61.176.59.111 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.113 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.122 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.123 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.130 [Unknown]
* - 61.176.59.138 [Unknown]
* + 61.176.59.141 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.142 [Unknown]
|___ 21 [ftp] File Transfer [Control]
|___ 25 [smtp] Simple Mail Transfer
|___ 53 [domain] Domain Name Server
|___ 80 [http] World Wide Web HTTP
|___ 139 [netbios-ssn] NETBIOS Session Service
|___ 443 [https] https MCom
* + 61.176.59.146 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.157 [Unknown]
|___ 21 [ftp] File Transfer [Control]
|___ 23 [telnet] Telnet
* + 61.176.59.160 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.162 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.174 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.177 [Unknown]
* + 61.176.59.187 [Unknown]
|___ 80 [http] World Wide Web HTTP
|___ 139 [netbios-ssn] NETBIOS Session Service
|___ 443 [https] https MCom
* + 61.176.59.202 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.203 [Unknown]
|___ 25 [smtp] Simple Mail Transfer
|___ 53 [domain] Domain Name Server
* + 61.176.59.210 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* - 61.176.59.219 [Unknown]
* - 61.176.59.222 [Unknown]
* - 61.176.59.228 [Unknown]
* + 61.176.59.230 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
|___ 2001 [木马] ?
* + 61.176.59.247 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
* + 61.176.59.253 [Unknown]
|___ 139 [netbios-ssn] NETBIOS Session Service
注意扫描结果中带加号的是扫描到的!减号的是没有扫描到的结果....
好好看看吧!.....
想知道我选中了哪个主机吗....?
呵呵!就是它了:
* + 61.176.59.64 [Unknown]
|___ 21 [ftp] File Transfer [Control]
|___ 25 [smtp] Simple Mail Transfer
|___ 80 [http] World Wide Web HTTP
|___ 139 [netbios-ssn] NETBIOS Session Service
|___ 443 [https] https MCom
有网友问我为什么选这个机器!
我告诉他最简单的道理被扫描的端口越多你入侵的可能性就越大...!
还等什么啊?....
快啊!
拿出流光2001
打开目标主机看见FTP主机了吗?
添加:61.176.59.64
然后在用追捕看看这个主机上的信息
用户名字...操作系统
然后在流光2001里添加用户名字
开始破戒口令吧!
要是找到没有的话就添下一个添加HTTP主机
总之只要你破了用户名字和口令就大公告成一半了!
开始扫描主机类型:....?
找到后选着NI或SQL远程命令
接着....
dir c:/
==============小榕软件实验室 1999-2000==============
=============流光2001 Preview 1 Build 2262==========
========NT Remote Cmd Virual CRT For Fluxay 2001====
LOCAL FILE:<FILE NAME>: 从本机指定的文本文件中读取命令序列
LOCAL CLS: 清除显示
LOCAL OPEN: 用浏览器打开当前站点
EXIT: 关闭
上键: 重复上一条命令
下键: 重复下一条命令
哈哈!
你看到什么了..........??? ![](http://www.20cn.com/ubb/smilies/smile.gif)
------------------
H I V
爱 之 病