• Hardening the Windows 2000 Machine
  • Using the Reverse Shell to Tag the Victim’s Desktop




    Download 0,51 Mb.
    bet10/10
    Sana01.04.2021
    Hajmi0,51 Mb.
    #13832
    1   2   3   4   5   6   7   8   9   10

    Using the Reverse Shell to Tag the Victim’s Desktop


    1. As shown below on this page, enter two commands to create a file on the victim’s desktop. This is a traditional way childish hackers scare victims, showing that you “own” their box.

    cd \documents and settings\administrator\desktop

    echo “ha ha” > YOURNAME_owns_your_computer.txt

    (Replace YOURNAME with your own name in the second command.)







    1. You should be able to see the new file on the victim’s desktop, as shown to the right on this page. Imagine how you would feel if files started appearing on your computer from nowhere while you were using it!

    Hardening the Windows 2000 Machine


    1. To prevent this exploit, just use Windows Update to put all service packs and updates onto the Windows 2000 machine. That will take a while, and may not be practical in the lab. But if you do, this exploit will stop working.

    Last Modified: 6-13-07

    CNIT 80X – Sam Bowne Page of

    Download 0,51 Mb.
    1   2   3   4   5   6   7   8   9   10




    Download 0,51 Mb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Using the Reverse Shell to Tag the Victim’s Desktop

    Download 0,51 Mb.