• Здраво и добредојдовте на форумот на IT.mk.

    Доколку сеуште не сте дел од најголемата заедница на ИТ професионалци и ентузијасти во Македонија, можете бесплатно да се - процесот нема да ви одземе повеќе од 2-3 минути, а за полесна регистрација овозможивме и регистрирање со Facebook и Steam.

Хакерски наредби во Dos

Статус
Затворена за нови мислења.
  • Ја почнал/а темата
  • #1

Electron

Баниран/a
23 април 2007
53
0
Info.txt:
A handy collection of command line tools
cpuinfo.exe - gets the processor type and CPU clocking speed (mhz)
fport.exe - shows open ports and the process that owns the port
iplist.exe - enumerates the ip's of the computer
md5.exe - gets the md5 hash of a file
pw2kget.exe - for win2k gets the password of the currently logged on user
pwreveal.exe - gets the passwords of any window that has a ****** editbox
regshell.exe - a commandline registry explorer/editor
resolve.exe - a commandline URL resolver
sendmail.exe - a commandline email sender
uptime.exe - gets the machines current uptime
xwhois - advanced whois lookup
Screencap.exe - makes a screenshot of the screen and saves it to screenshot.bmp
CMDget.exe - Downloads a file from a website from user provided parameters
webscr.exe - creates a snapshot from the webcam and saves it
shutd.exe - program that forces shutdown/reboot of machine
bnc.exe - bnc for windows (see bnc.cfg)
clslog.exe - clears app/security/system logs XP/NT/2k
enum.exe - enumerates IPC$ share to collect information
winfo.exe - enumerates IPC$ share to collect information
FTPd.exe - small ftp server for dos (see slimftpd.conf)
Global.exe - process dos command on all disc/subdirs
iCmd.exe - telnet server 98/xp/nt/2k
iislog.exe - clears IIS logs
Info.exe - gets system information
ispc.exe - spawns shell on hacked IIS (put idq.dll on remote script dir)
nc.exe - netcat
pv.exe - process manager for dos
Pwdump.exe - dumps SAM hashes
scrnmode.exe - change screen mode from dos
unrar.exe - unrar for dos
wget.exe - wget for windows
wizmo.exe - command tool (see w.txt)
dwpp.exe - dial up password graber
winrelay.exe - relay tcp/udp connections
getad.exe - escalate to admin user in w2k
pipeup.exe - escalate to admin user in w2k
dnsid - identify remore dns server
rinetd.exe see rinetd.txt

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.

Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter.

This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD.

First thing you need to know is some very helpfull commands to use on CMD(Command Prompt).

In case you don't know how to get CMD open in your box, then click on Start, then Run, then type "cmd" (no quotes, off course... you know the drill).

Back to commands:

Code:

nslookup
net view
net use
net user
ping
tracert
arp
route
nbtstat
netstat
ipconfig

In case you don't know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does.

Lets start easy...

1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the "ping" command.

Code:

ping x.x.x.x (x is the IP address)


or

ping www.whatever.com (www.whatever.com is the website you want to ping, but you don't know the IP)

OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down.

2) nslookup : This command has many functionalities.
One is for resolving DNS into IP.
Lets say you know the website URL but you don't know its IP(and you want to find out).

nslookup www.whatever.com (www.whatever.com is the website you want to find out the IP)

Now, another really nice function of nslookup is to find out IP of specific Mail Severs.

Code:

nslookup (enter)
set type=mx (enter)
yahoo.com


This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn't it?

OK, now why would you want to have an IP of a mail server?
To send spoofed mail to your friends or even for SE.
In case you looking for "How to spoof email", then look for my "How to spoof email tutorial" http://www.infowar.com/forums/showthread.php?s=&threadid=2360

3) tracert : This command will give you the hops that a packet will travel to reach its final destination.

OBS: This command is good to know the route a packet takes before it goes to the target box.

Code:

tracert x.x.x.x (x is the IP address)


or

tracert www.whatever.com (www.whatever.com is the website you don't know the IP)

4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN.

Code:

arp -a

5) route : This command will show you the routing table, gateway, interface and metric.

Code:

route print


6) ipconfig : This command will show tons of very helpful things.
Your IP, gateway, dns in use.

Code:

ipconfig


or

Code:

ipconfig /all

this command will give all that info but for all networks you might have it.

Also, in case you have a dynamic IP and want to change it, then type...

Code:

ipconfig /release (this will release your IP)

ipconfig /renew (this will renew your iP)

OBS: Keep in mind that those commands will change your IP, but The new IP will still be tighed up to you. So don't do anything stupid.

7) netstat : This command will show you connection to your box.

Code:

netstat

or

Code:

netstat -a (this will show you all the listening ports and connection with DNS names)
netstat -n (this will show you all the open connection with IP addresses)
netstat -an (this will combined both of the above)

8)nbtstat : This command will show you the netbios name of the target box.

Code:

nbtstat -A x.x.x.x (x is the IP address)

nbtstat -a computername


net view x.x.x.x or computername (will list the available sharing folders on the target box)


Now some hints:

Code:

net use \ipaddressipc$ "" /user:administrator

(this command will allow you to connect to the target box as administrator)

Now if you want to connect to the target box and browse the entire C drive, then use this command:

Code:

net use K: \computernameC$
(this will create a virtual drive on your "my computer" folder)

OBS: Keep in mind that this will only works if the target box doesn't have an administrator password set.

And least but not last, the "help" command.

Quote:

whatevercommand /help

or

Quote:

whatevercommand /?


This command will help you to understand what it does and all the switchs available for each command.
Very useful if you know the command, but forgot the right switch.
 

SwIPE

Intern
29 мај 2007
346
5
cpuinfo.exe - gets the processor type and CPU clocking speed (mhz)
fport.exe - shows open ports and the process that owns the port
iplist.exe - enumerates the ip's of the computer
md5.exe - gets the md5 hash of a file
pw2kget.exe - for win2k gets the password of the currently logged on user
pwreveal.exe - gets the passwords of any window that has a ****** editbox
regshell.exe - a commandline registry explorer/editor
resolve.exe - a commandline URL resolver
sendmail.exe - a commandline email sender
uptime.exe - gets the machines current uptime
xwhois - advanced whois lookup
Screencap.exe - makes a screenshot of the screen and saves it to screenshot.bmp
CMDget.exe - Downloads a file from a website from user provided parameters
webscr.exe - creates a snapshot from the webcam and saves it
shutd.exe - program that forces shutdown/reboot of machine
bnc.exe - bnc for windows (see bnc.cfg)
clslog.exe - clears app/security/system logs XP/NT/2k
enum.exe - enumerates IPC$ share to collect information
winfo.exe - enumerates IPC$ share to collect information
FTPd.exe - small ftp server for dos (see slimftpd.conf)
Global.exe - process dos command on all disc/subdirs
iCmd.exe - telnet server 98/xp/nt/2k
iislog.exe - clears IIS logs
Info.exe - gets system information
ispc.exe - spawns shell on hacked IIS (put idq.dll on remote script dir)
nc.exe - netcat
pv.exe - process manager for dos
Pwdump.exe - dumps SAM hashes
scrnmode.exe - change screen mode from dos
unrar.exe - unrar for dos
wget.exe - wget for windows
wizmo.exe - command tool (see w.txt)
dwpp.exe - dial up password graber
winrelay.exe - relay tcp/udp connections
getad.exe - escalate to admin user in w2k
pipeup.exe - escalate to admin user in w2k
dnsid - identify remore dns server
rinetd.exe see rinetd.txt

Ова не се стандардни наредби кои се извршуваат во DOS (CMD или COMMAND PROMPT), туку се извршни console-based програми кои не доаѓаат во пакет со Windows оперативните системи и за да се користат прво е потребно да ги download - ираш.


nslookup
net view
net use
net user
ping
tracert
arp
route
nbtstat
netstat
ipconfig

Е ова се стандардни наредби кои може да ги користи секој Windows корисник и не е потребно дополнително download - ирање.
Овде си (односно авторот на текстот) заборавил и некои други основни наредби како на пример од TCP/IP наредбите си ги заборавил TELNET и FTP, потоа REXEC, RSH, RCP, TFTP и други.
 

Andrijeski

Gaining Experience
1 март 2007
2,599
65
andrijeski.net
Се согласувам со SwIPE. И да, ако веќе те мрзело да преведуваш и средиш, си можел да оставиш само линк до текстот :)
 
  • Ја почнал/а темата
  • #4

Electron

Баниран/a
23 април 2007
53
0
Се согласувам со SwIPE. И да, ако веќе те мрзело да преведуваш и средиш, си можел да оставиш само линк до текстот :)
Nemase link ne znam od kaj go zedov i plus takov go najdov tekstot, ne deka me mrzeshe barem jas se potrudiv da najdam neso novo sho go nemalo dosega
 

petar.bt

Intern
12 август 2007
731
20
za stavanje na password na user preku dos

net user
posle gledas koj useri se i :
net user imeto na userot *
pr. net user petar *
cao
 

neW1

Gaining Experience
10 мај 2007
679
146
а како беше командата за проверка на uptime во cmd???
Не сум го видел ова...
99% сум сигурен дека беше systeminfo | find up time .Нека ме поправи некој што е во можност да провери ако не е така ;)

edit: или вака беше systeminfo | find "System Up Time:" :rolleyes:
 
Статус
Затворена за нови мислења.

Нови мислења

Последни Теми

Статистика

Теми
42,578
Мислења
821,068
Членови
28,239
Најнов член
Serafimov
На врв Дно