When a hacker invades a target, he often leaves a back door to control the computer for a long time. However, the back door is ultimately a hacking tool, which is one of the targets of anti-virus software. After the anti-virus software is upgraded, the back door is deleted. But there is a kind of backdoor that will never be killed by anti-virus software, that is, a hidden system clone account.
Xiao Bian Tip: clone account is the most hidden back door in Windows, each account in the registry has a corresponding key, this key affects the rights of the account. When the hacker copies the key value in the registry, he can clone the account with one user right into an account with administrator rights and hide the account. Hidden accounts are invisible both in “user management" or "command prompt". Therefore, general computer administrators rarely find hidden accounts, and the harm is enormous.
1 add the command line mode account click on the & ldquo; start & rdquo; & rarr; & ldquo; run & rdquo ;, enter & ldquo; cmd & rdquo; run & ldquo; a command prompt & rdquo ;, enter the following command: net user Test$ /add and hit enter, so you can create an account called test$ in the system. Continue typing: net localgroup administrators test$ /add and press Enter, which will raise the test$ account to administrator privileges.
2 add a hidden account Step 01 Click & ldquo; start & rdquo; & rarr; & ldquo; & rdquo ;, run input & ldquo; regedt32.exe & rdquo; after the carriage return, the pop-up & ldquo; & rdquo ;. Registry Editor In regedt32.exe, go to “HKEY_LOCAL_MACHINESAMSAM”, click “Edit"Menu →“Permissions", in the pop-up "SAM Permissions" edit window, select "administrators" account, below Check the full control of the permission settings, click on & rdquo; OK “
3 set registry operating authority Step 02 in & rdquo; run & ldquo; Enter & rdquo; regedit.exe & ldquo; run & rdquo; Registry Editor & ldquo ;, locate & rdquo; HKEY_LOCAL_MACHINESAMSAMDomainsAccountUsersNames & ldquo; at, click to hide the account & rdquo ;test$“, the type of the key value displayed on the right side of the "type" is displayed as 0x404, up to "HKEY_LOCAL_MACHINESAMSAMDomainsAccountUsers", you can find the ” 00000404“ this item, the two are mutually corresponding All information for the hidden account "test$“ is in the “00000404“ Similarly, we can find the account corresponding to the ”administrator“ account is ”000001F4“.
Step 03 exports the key value of "test$“ to test$.reg, and exports the F key values of the ”00000404“ and ”000001F4“ items to user.reg, admin. Reg. Use ”Notepad“Open admin.reg, copy the contents of the "F“ value", replace the "." value in user.reg, save the 4 to find the hidden account corresponding key value Step 04 In the "command prompt" in the "net user test$ /del“ command, delete the hidden account we created. Don't be nervous, this step just deletes the hidden account & quoquo; empty shell & ldquo;, just like the cleanup after the invasion, the hidden account is not changed. Finally, we double-click the two registry files test$.reg and user.reg and import them into the registry and you're done.
When you mention ASP (ActiveServerPage), everyone will think of Windows. It is popular among WEB dev
In the LAN working environment, network administrators often manage remotely through remote desktops
Windows Server 2008s new Server Manager console tool eases the pressure on organizations to manage a
I. INTRODUCTION We envision a remote control solution: a company wants to place such an IIS Web serv
Windows 2008 R2 WEB Server Environment
Windows 2003 system also play picture collection screensaver
How to install XP or 2003 in Windows Vista computer
Solving the problem that Windows Server 2008 R2 cannot connect to the wireless network
Setting up local policy application for Win 2003
Resolve Win2008 Recycle Bin can't clear fault
Microsoft Windows 2008 Server Chinese Standard Edition promotes
Win2008 Performance and Availability Detection Tool Configuration Guide
Windows Server 2003 Security Event ID Analysis
Partition your mobile hard disk with Windows' disk management tools
Win10 implements the method of dragging files to automatically create folders
360 mobile phone chubby detailed use tutorial
The first security update for Windows 8 Mail
Win2003 IIS6 server settings troubleshooting
Clean up Windows 8 system app store cache
Win XP printer sharing problem solving method
Remove Vista SP2 network connection half open limit