How to hack into ports 3389 and 135 and how to find someone else s username and password

Updated on technology 2024-05-10
10 answers
  1. Anonymous users2024-02-10

    1. Open Notepad and read as follows:

    echo [components] >c:\sql

    echo tsenable = on >>c:\sql

    sysocmgr /i:c:\winnt\inf\ /u:c:\sql /q

    After that, save it as a bat file, upload it to the broiler, and execute. It is worth noting here to determine if Winnt is on the C drive, if it is on a different disk it needs to be changed.

    How to use: Use the script host program that comes with Windows to invoke scripts in command-line mode, for example:

    C: > cscript "Destination IP> "Username" "Password" [Service Port] [Auto-Reset Option].

    Service Port: Set the service port for Terminal Services. The default is 3389.

    Auto-restart option: Use r to indicate that the auto-restart target is complete for the setting to take effect.

    Use fr to force a reboot target. (If r doesn't work, you can try this).

    When using this parameter, the port settings cannot be ignored.

    For example, a server with a weak NT password is scanned, the IP address is Administrator, the administrator account is Administrator, and the password is empty.

    Run cmd (dos under 2000) and we'll open the terminal for it!

    The order is as follows! cscript administrator "" 3389 /fr

    The above command should be understandable, right? cscript This is the command, followed by the ip, then the administrator account, and then this is the password, because the administrator password of this server is empty, then it is empty in double quotation marks, and then it is the port, you can set the port of the terminal arbitrarily, fr is the restart command (force restart, generally I use this, you can also r, this is a normal restart).

    The script will determine the target system type, and if it is not server or above, it will prompt you whether you want to cancel it.

    Because the Pro version can't install Terminal Services.

    If you're confident that the script is wrong, go ahead and install it.

    If you want to use it locally, the IP address is either a dot (use. representation), the username and password are blank (with""representation).

    The script accesses port 135 of the destination, if the destination port 135 is not open, or if the WMI service is down, then the script is useless.

    Instructions: Unzip, use whatever method you want to upload the decompression to the broiler's c: winnt temp, and then enter c:

    winnt temp directory to unzip the file, and then execute the unzipped file, and the broiler will automatically restart after a while! Terminal Services will appear after the restart!

  2. Anonymous users2024-02-09

    telnet -l administrator **10001 user: administrator,

    Port: 10001

    n years useless.

  3. Anonymous users2024-02-08

    I'm particularly interested in seeing people who do bad things, but unfortunately I don't.

  4. Anonymous users2024-02-07

    Then change your mind, try the peanut shell software, 3 simple steps, easy to get the remote desktop.

  5. Anonymous users2024-02-06

    3389 scanner, a tool that specializes in scanning 3389 terminals, or the next X-Scan is pretty good, you can scan anything, a mainstream tool.

  6. Anonymous users2024-02-05

    The Harlan wind is blowing, and this season can't do without it!!

  7. Anonymous users2024-02-04

    System password cracker? You can develop it yourself, it's really talented.

  8. Anonymous users2024-02-03

    1. First of all, through the "win+r" key, open the run dialog box, enter, and call up the local group policer.

    2. Select "Computer" - "Windows Settings" - "IP Security Policy on Local Computer".

    3. Right-click the mouse in the window on the right and select Create IP Security Policy from the pop-up dialog box.

    4. In the pop-up security policy wizard, click Next all the way to complete the policy creation.

    5. Finally, in the "Close Port Properties" dialog box, remove the "Use Add Wizard" checkmark and click the "Add" button.

    6. Finally, in the IP filter list, enter the name "Close Port 139", and remove the checkmark in front of "Use Add Wizard", and you're done.

  9. Anonymous users2024-02-02

    First of all, prepare a scanning software, any one will do, I won't crack the system thread at the time to be amused by the S scanner. So I used ipbook, and here I still recommend all rookie friends to use the s scanner to scan. Because S is recognized as the fastest scanner in the underworld and then enter the IP segment to be scanned, I remember that I was scanning with my IP segment at the time (I want to see what my neighbors are doing!).

    Haha) The port of scanning is filled in 3389 (nonsense) and then start scanning, wait, wait, a cup of tea. The results are out, and I'm lucky that there are a lot of scans, haha. (It seems that everyone's security awareness is not very high) Then take out the login device that the system has shouted from itself, start-program-accessory-remote control connection (everyone has found it) or start-run-enter mstsc, and then enter the IP just swept out to see the login section (remember that it must be an XP machine, if it is a 2003 or 2000 NT machine, just give up and replace the next IP) because the machine that is not XP cannot be logged in with the default account Okay, if it is an XP machine Just enter the following account to try to log in The password is empty new administrator guest If these 3 accounts can't log in after trying, then change the next IP (generally you can log in with the above 3 accounts) Go in and see someone else's desktop If you go in for a while and prompt something to refuse to log in, then we can wait to try because this is the owner of the machine in front of the computer Don't let you log in, Therefore, the 3389 invasion is generally suitable for carrying out in the middle of the night when no one is there (there are many people hanging up at night, and when the time comes, we can play how we want to play, haha) and then we will transfer our remote control Trojan to the other party's computer in order to further control.

  10. Anonymous users2024-02-01

    Let's catch the chicken with the wolf's fangs.

    I searched the Internet for a whole bunch of them.

Related questions
5 answers2024-05-10

Run cmd to enter netstat -an

The port is an open port, which IP address is connected to. >>>More

3 answers2024-05-10

1. First of all, use the "win+r" key to open the run dialog box, and enter and bring up the local group policer. >>>More

18 answers2024-05-10

The computer will be poisoned, and the screen will appear with a disgusting amoeba avatar.

12 answers2024-05-10

The art of getting along with colleagues.

Even if you don't work overtime, you spend 8 hours a day with a shift of colleagues, and then the problem arises: family is family, friendship with friends, love with lovers, but the relationship with colleagues is very complicated. How to deal with this kind of relationship, here are a few tricks for you: >>>More

30 answers2024-05-10

Quite simply, you tell the truth, if you really don't have enough money. And if you are married, or find a girlfriend, it is reasonable to use this as an excuse, and don't use your parents as an excuse to say that it is unreasonable. >>>More