Joke Collection Website - Blessing messages - Wanxiang network management

Wanxiang network management

Answer: playboy

schoolmate

June 3, 20:53 Vientiane

One of the most important files is the database file named "OctLog.mdb", which records the members of Vientiane.

Data, including sensitive data such as membership information, membership card number and balance. If this file is inadvertently

Good-hearted people intercept and modify at will, and the consequences are very serious. Therefore, I want to remind the administrators of Internet cafes that they must

Protect your membership database.

The following is the author's point of view to describe the whole cracking process, so that you can understand that it is caused by improper configuration.

A serious loophole.

I. Preliminary work

The first problem is how to approach the database file "OctLog.mdb". Let's briefly analyze it here.

Imagine that the current Internet cafes generally don't install Vientiane server version (cashier end) on disk C, because they are worried about the system.

The problem is data loss, most of which are installed outside the C drive, such as "D:OCTOPUS". So we have to

Determine which host computer is in the Internet cafe, and whether the disk with "OctPUS" is available? If installed,

The disc of "OctPUS" is not what * * * likes. Try to let "OctLog.mdb" be enjoyed by * * *, maybe you think it is enjoyed by * * *.

There won't be an Internet cafe called "OctLog.mdb", but I think there are many such Internet cafes. Maybe you can use them.

Internet cafes are, so you just have to ... because the management level of internet cafes is not very high now. Even if there is

Don't be discouraged if Internet cafes enjoy "OctLog.mdb" for the time being. Sometimes, when the personnel of Internet cafes change, the host settings also change.

It is also possible to change, and this time there is an opportunity. ...

The magical use of 1, Autorun, inf file

For example, Vientiane is installed on disk D, and disk D does not enjoy it, and other disks such as disk E enjoy it, then

Based on the principle of CD-ROM automatic running program, a program (such as E-disk) is established under the root directory of complete enjoyment.

"Autorun.inf" file, you can use Notepad, and the file save suffix is inf. The contents are as follows

[Automatic operation]

Openness = Trojan horse's road.

In this way, when someone wants to open the E disk, Trojan will run automatically. This method is easy to be discovered by others.

Because if you don't delete the "Autorun.inf" file, the administrator can't double-click into the E disk. If you want to go in,

You must right-click to open it.

2. Steal columns by using Vredir.vxd file.

Most of the Internet cafes you meet may be encrypted and read-only on disk D, and the password of * * * can be cracked under Win98.

The method is very simple, because there is a BUG in the password correction of Win98***, as long as it is modified.

The Vredir.vxd file is copied to the WINDOWSSYSTEM directory to overwrite the source file. After restarting the computer, you

Use the password * * *, re-enter the directory, and you don't need to enter the password when a window prompting for the password appears, just press and hold.

You can go in without putting the enter key! If the recovery wizard is installed in the Internet cafe, we can click "".

Shut down the system ",select" restart the computer ",hold down the Shift key at this time, and then click Re.

Start ok, you can bypass the restore wizard!

Second, the wonderful part

1, the first move-take Huanglong directly.

The luckiest thing is to meet the "OctPUS" directory, enjoy it completely, and install the Internet cafe client.

Microsoft Access, this is the easiest time to invade. Use the client Microsoft Access to open the cashier.

Machine "OctLog.mdb", this is the prompt for entering the password, and you will see it after entering "alpha" for confirmation. choose

Select "Open Database" and enter "alpha" again, as shown in the following figure:

Leave him alone. Click OK.

Then double-click User List, and it will

See what? You can see the panoramic view of member information. Just click the membership card number under "Card number" and "Password"

When you click the password, "remaining" is the remaining amount, and ... the data in it can be used directly? br/>;

Yes, you can add a 0 after the amount of your user name, hehe! You can even add new members.

, modify the password and other operations.

2, the second trick-camouflage deception

First, download Vientiane (the download address is: /show.asp? id = 3680)

After downloading, select the installation server version.

The installation path should not be the same as the client installation path and should never be run after installation. Of course, if you don't

Fortunately, in less than 30 seconds, the administrator will be standing behind you ... creepy.

Because after running, the "real" server will prompt that another server is running on that computer.

So we need to make the necessary settings. First, map the "real" server installation directory to a local computer.

Drive f disk. Then open ODBC Data Source (32-bit) in the local control panel. Select configuration

"Octopus", then select "OctLog.mdb" on the server in the dialog box that appears, and click.

Configure and select Select in the image that appears. Then select your mapping in the data source of the dialog box.

The database on your computer, that is, the data source of the host, and then start it. These are two servers, but.

* * * Use a synchronous database. Finally, open the registry editor and find "HKEY- local-

MACHINESOFT Wonderland "key. First, create a new primary key "Expert Department" after Vientiane Fantasy.

Network management software server "column, the server is temporarily not running, so this key should be added by yourself, and then in the" special "

Add a DWORD value in "Home Series Network Management Software Server", named LPORT, and set the data to be arbitrary.

A value such as 8207.

Close the registry, which will be a big announcement. At this point, open the server of this machine, and a dialog box will pop up, showing

Wrong tip, we don't have to worry about him. After clicking "OK" to enter, we can't see any computers in the LAN.

Yes (that's why you can't reverse control), but you can operate the member's database.

The operation of the two databases is synchronous, so you can add money to the membership card, hehe!

3. The third measure-

It is worth noting that the third trick is my guess without actual operation, please friends.

Not by example! Since what we have to do now is how to open "OctLog.mdb", and in the same

Opening a network with a server will be discovered, so we can't go through the server in another network.

How about opening it? My guess is: first, put your computer outside the LAN, by modifying this machine.

IP address realization! The IP address of a general LAN is192.168.0.1.

I can set the IP address to any value first. At this point, the computer asks to restart the computer, click Cancel, and then

The network card is banned, and the computer still prompts to restart. Leave him alone and start the network card.

Change the IP address easily! Then ... it's up to you!

Reference: /isapi