|
Using the Reverse Shell to Tag the Victim’s Desktop
|
bet | 10/10 | Sana | 01.04.2021 | Hajmi | 0,51 Mb. | | #13832 |
Using the Reverse Shell to Tag the Victim’s Desktop
As shown below on this page, enter two commands to create a file on the victim’s desktop. This is a traditional way childish hackers scare victims, showing that you “own” their box.
cd \documents and settings\administrator\desktop
echo “ha ha” > YOURNAME_owns_your_computer.txt
(Replace YOURNAME with your own name in the second command.)
You should be able to see the new file on the victim’s desktop, as shown to the right on this page. Imagine how you would feel if files started appearing on your computer from nowhere while you were using it!
Hardening the Windows 2000 Machine
To prevent this exploit, just use Windows Update to put all service packs and updates onto the Windows 2000 machine. That will take a while, and may not be practical in the lab. But if you do, this exploit will stop working.
Last Modified: 6-13-07
|
| |