خوش آمدید

جستجو

تبلیغات





مربوط به مقاله هکرها را بخار کنید

    فایل bat *********

    REG ADD HKCU\System\CurrentControlSet\Control\Lsa /f /v restrictanonymoussam /t REG_DWORD /d 00000002

    REG ADD HKCU\System\CurrentControlSet\Control\Lsa /f /v restrictanonymous /t REG_DWORD /d 00000002

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /f /v EnableFirewall /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /f /v DefaultInboundAction /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /f /v DefaultOutboundAction /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /f /v DoNotAllowExceptions /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /f /v EnableFirewall /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /f /v DefaultInboundAction /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /f /v DefaultOutboundAction /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /f /v DoNotAllowExceptions /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /f /v EnableFirewall /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /f /v DefaultInboundAction /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /f /v DefaultOutboundAction /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /f /v DoNotAllowExceptions /t REG_DWORD /d 00000001

    ------

    sc stop TermService

    sc stop Netlogon

    sc stop RemoteRegistry

    sc start SharedAccess

    sc stop FastUserSwitchingCompatibility

    sc stop NetTcpPortSharing

    sc stop RemoteAccess

    sc stop TlntSvr

    sc stop WebClient

    taskkill /f /im iexplore.exe

    explorer.exe

    REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg\AllowedPaths /f /va

    REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg\AllowedExactPaths /f /va

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters /f /v AutoShareWks /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters /f /v Hidden /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server /f /v AllowRemoteRPC /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters /f /v Hidden /t

    REG_DWORD /d 00000001 NET USER Administrator NEWPASSWORD

     

    فایل رجیستری

      Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile] "DisableNotifications"=dword:00000000 "EnableFirewall"=dword:00000001 "DoNotAllowExceptions"=dword:00000001 "DisableUnicastResponsesToMulticastBroadcast"=dword:00000000 "DefaultOutboundAction"=dword:00000000 "DefaultInboundAction"=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] "DisableNotifications"=dword:00000000 "EnableFirewall"=dword:00000001 "DoNotAllowExceptions"=dword:00000001 "DisableUnicastResponsesToMulticastBroadcast"=dword:00000000 "DefaultOutboundAction"=dword:00000000 "DefaultInboundAction"=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile] "DisableNotifications"=dword:00000000 "EnableFirewall"=dword:00000001 "DoNotAllowExceptions"=dword:00000001 "DisableUnicastResponsesToMulticastBroadcast"=dword:00000000 "DefaultOutboundAction"=dword:00000000 "DefaultInboundAction"=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server] "AllowRemoteRPC"=dword:00000000 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration] "Password"= "UserName"= [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp] "PortNumber"=dword:1bb1 "UserAuthentication"=dword:00000001 "Username"= [HKEY_CURRENT_USER\System\CurrentControlSet\Control\Lsa] "restrictanonymoussam"=dword:00000002 "restrictanonymous"=dword:00000002 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "NoNetCrawling"=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters]"AutoShareWks"=dword:00000000 "Hidden"=dword:00000001

    تحقیق و تالیف بهمن علیزاده http://unsafe4birds.blogfa.com


    این مطلب تا کنون 16 بار بازدید شده است.
    منبع
    برچسب ها : dword ,hkey ,stop ,local ,donotallowexceptions ,defaultinboundaction ,dword 00000001 ,dword 00000000 ,hkey local ,00000001 hkey ,00000000 defaultoutboundaction ,defaultoutboundaction dword 00000000 ,00000000 defaultoutboundaction dword ,dword 00000000 defaultoutboundaction ,dword 00000000 defaultinboundaction ,
    مربوط به مقاله هکرها را بخار کنید

تبلیغات


    محل نمایش تبلیغات شما

پربازدیدترین مطالب

آمار

تبلیغات

محل نمایش تبلیغات شما

تبلیغات

محل نمایش تبلیغات شما

آخرین کلمات جستجو شده