3389安全设置(已完成)第1/2页 Arp欺骗加嗅探,玩黑的朋友一定不会陌生,大家玩得最多的就是在同网段中嗅探ftp的密码,所以一般都喜欢渗透的主站开个ftp,但更多的时候是主站开3389的机率要比ftp大吧,如果能直接嗅探3389岂不是更爽.Cain是大家都熟悉
Arp欺骗加嗅探,玩黑的朋友一定不会陌生,大家玩得最多的就是在同网段中嗅探ftp的密码,所以一般都喜欢渗透的主站开个ftp,但更多的时候是主站开3389的机率要比ftp大吧,如果能直接嗅探3389岂不是更爽。
Cain是大家都熟悉的一款软件,具有arp欺骗加嗅探和密码破解的功能,这里提供一个最新版的下载地址:http://www.ncph.net/cain.exe,具体用法就不多讲了,相信大家都会用这个。本来cain就自带了嗅探终端(3389)密码的功能,但没有听用过,以前我也没有用过这个功能,但一次无意间使用嗅探时开了嗅探3389的功能,最后其它的什么都没有嗅探到,去嗅探到了一个RDP值,打开一分析,原来3389的密码就在其中。
很多朋友看了我的blog中的那个网站的渗透,都问我怎么嗅探到3389密码的,所以我打算把这个写出来共享给大家,转载请注明。
这里给大家做一个图文教程:首先安装cain.exe,默认安装就ok.
1.打开sniffer页面:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('/upfiles/imgfile/2307/1DU223Xb440-35410.jpg');}" alt="" src="/upfiles/imgfile/2307/1DU223Xb440-35410.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
2.打开端口配置,设置嗅探3389端口:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('/upfiles/imgfile/2307/1DU223Y45M0-4T21.jpg');}" alt="" src="/upfiles/imgfile/2307/1DU223Y45M0-4T21.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
3.点击嗅探和右击扫描mac:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('/upfiles/imgfile/2307/1DU223Y91250-5O22.jpg');}" alt="" src="/upfiles/imgfile/2307/1DU223Y91250-5O22.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
4.打开arp页面,单击“+”号,打开欺骗设置:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('/upfiles/imgfile/2307/1DU223Z364Z-A322.jpg');}" alt="" src="/upfiles/imgfile/2307/1DU223Z364Z-A322.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
5.左边选网关,右边选欺骗的ip:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('/upfiles/imgfile/2307/1DU223ZL550-HU1.jpg');}" alt="" src="/upfiles/imgfile/2307/1DU223ZL550-HU1.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
6.点击欺骗按钮开始欺骗:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('/upfiles/imgfile/2307/1DU2239116120-X506.jpg');}" alt="" src="/upfiles/imgfile/2307/1DU2239116120-X506.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
7.显示欺骗到一条数据:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('/upfiles/imgfile/2307/1DU223915X50-cZ0.jpg');}" alt="" src="/upfiles/imgfile/2307/1DU223915X50-cZ0.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
8.选择arp-rdp,在右边栏中右击数据:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('/upfiles/imgfile/2307/1DU2239201510-10KW.jpg');}" alt="" src="/upfiles/imgfile/2307/1DU2239201510-10KW.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
9.右击后打开的文档:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('/upfiles/imgfile/2307/1DU2239242K0-1139C.jpg');}" alt="" src="/upfiles/imgfile/2307/1DU2239242K0-1139C.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
10:在文档中找到3389的管理员登录用户名和密码:screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.style.cursor='hand'; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" onclick="if(!this.resized) {return true;} else {window.open('https://imgs.dedegg.com/imgfile/2307/1DU22392QO0-121645.jpg');}" alt="" src="https://imgs.dedegg.com/imgfile/2307/1DU22392QO0-121645.jpg" onload="if(this.width>screen.width*0.7) {this.resized=true; this.width=screen.width*0.7; this.alt='Click here to open new window\nCTRL+Mouse wheel to zoom in/out';}" border=0>
以上在外网和内网中测试通过,可以准确地抓到管理员密码,但必须是管理员登录成功后才能抓到,其实cain利用了arp欺骗截取数据传输封包,并且能破解3389的加密协议,软件不错
当前1/2页 12下一页阅读全文
Tags:3389安全设置(已完成)
相关文章
- 2007-05-05mysql密码忘记的修改方法
- 2007-05-05mysql实现自动远程备份一办法
- 2007-03-03用IIS建立高安全性Web服务器的方法
- 2006-10-10Web服务中的异常处理(4)
- 2007-05-05win2003下安装apache2.2.3+php5.2+mysql+Zend的配置方法
- 2006-10-10使用Apache&花生壳架设Web服务器
- 2006-12-12解决IIS的Server Application Error的2种方法
- 2006-10-10UNIX下的PHP环境配置,+apache
- 2007-10-10win+apache+php+mysql+phpmyadmin环境配置方法
- 2007-08-08安全维护 IIS下 ASP 站点的高级技巧
最新评论
本文标题为:3389安全设置(已完成)第1/2页
基础教程推荐
- P3 利用Vulnhub复现漏洞 - Apache SSI 远程命令执行漏洞 2023-09-10
- Centos 安装Django2.1 2023-09-24
- windows环境下apache-apollo服务器搭建 2023-09-10
- Docker容器操作方法详解 2022-11-13
- 通过StatefulSet部署有状态服务应用实现方式 2022-10-01
- Apache Kafka 2.5 稳定版发布,新特性抢先看 2023-09-11
- RFO SIG之openEuler AWS AMI 制作详解 2022-12-28
- 为Win2003服务器打造铜墙铁壁的方法步骤 2022-09-01
- Apache CarbonData 1.0.0发布及其新特性介绍 2023-09-11
- Centos7 nginx的安装以及开机自启动的设置 2023-09-22
