Why can t I open the 135 overflow tool

Updated on technology 2024-05-17
7 answers
  1. Anonymous users2024-02-10

    Basically it means that a port vulnerability or a program is used to make a large number of target machines with known IPs slow down the operation speed due to a large number of data streams and cause overflow, so as to control a large number of computers to be used by broilers!

  2. Anonymous users2024-02-09

    I don't know which province you're from, but now the vast majority of provinces (except Guangxi with Black Eagle Netizen Statistics) restrict the scanning of 135 ports, and only 135 in their own province can be scanned, but it is not excluded that some provinces suddenly lift this restriction, but even if it is, it is temporary. The 1433 technology is a little old, but considering that the number of hosts that install SQL is extremely considerable, the old method is still worth trying, but the success rate is extremely low. In addition, the sa air code is actually more convenient, you can try it, that's all I know ] is all knowledge of hacking.

  3. Anonymous users2024-02-08

    You just scan out the machine open 1433 port, does not mean that you scan out the weak password of the 1433 port, only scan out the weak password, you can upload your pigeon, you scan the open 1433 fracture of the IP with X-Scan to scan the weak password, scanned out can be uploaded, in addition, if your gray pigeon is not free to kill, it is easy to be killed by the other party's antivirus software, which is also one of the reasons for failure.

    But there are fewer and fewer chickens that tell you weak passwords now, so you still have to learn more about how to hang up the net!

    Which is because your program is missing, you can restart the next program, but most of the scripts on the Internet have been deleted.

  4. Anonymous users2024-02-07

    The principle is to put the horse through the loophole. If you have a tool, you will.

  5. Anonymous users2024-02-06

    1433 rarely catches chickens in the overflow way, and basically uses the weak password of the SQL Server database corresponding to its own port to invade. That is, when you use the s scanner to scan a lot of IPs that open port 1433, use x scan or streamer or hscan, etc., you can scan the weak password of his SQL server service, when the scan is completed, look at the scan report, he will list many IPs, as well as his database account password, the account password here refers to the SQL Server database account password, not the system itself login password, Then use the SQLTOOLS tool to connect, fill in the IP, account, and password, and then go directly to run the DOS command, elevate privileges, and open the terminal port. If there is any stored procedure, 126 127 error, etc., there will be a solution by using Google search.

    Port 135 is the port that the RPC service responds to, and there are two related services They respond to 139 and 445 Here you are mentioning 135 I won't talk about those two. Similarly, to scan an IP with open port 135 and use ntscan to guess his weak password, and then telnet the disassembled IP with weak password, so that we can directly get his DOS permission, and then upload the remote control Trojan, or directly escalate the permission. In contrast, the broilers that can be caught by the 1433 port are mostly servers and computer room servers, and the system is mostly windows2003, while 135 is more personal computers, and the system is more xp 135 is normal to catch the broilers of the win7 system. Wish.

  6. Anonymous users2024-02-05

    Intranet or extranet. If the intranet is invaded by IPC. Rest assured that it is useless unless it is win2000

    Extranet. Don't think about it.

    If it is an intranet, you can use remote overflow methods and DNS spoofing. There are many ways to play on the intranet.

  7. Anonymous users2024-02-04

    If the other party's group policy is hijacked, you can't open telnet View the original post

Related questions
3 answers2024-05-17

It is recommended to check and kill the Trojan horse and repair the system. >>>More

12 answers2024-05-17

This prompt may cause the hard drive to be corrupted. You can use a tool such as "HDTune" to check your hard drive. If you rule out the hard drive, it is likely that there is a problem with the BIOS settings, and you can try to restore the BIOS to the default settings. >>>More

13 answers2024-05-17

What happens if you can't open the webpage Why can't you open the webpage, the answer is as follows. >>>More

35 answers2024-05-17

If you still can't open QQ Farm or open blank in a good network environment, you can try the following 4 ways to solve the problem: >>>More

7 answers2024-05-17

1 The document is incomplete, repeat it.

2 There is a virus on your computer. >>>More