تمامی مطالب مطابق قوانین جمهوری اسلامی ایران میباشد.درصورت مغایرت از گزارش پست استفاده کنید.

جستجو

تبلیغات


مربوط به مقاله هکرها را بخار کنید

    فایل bat *********

    REG ADD HKCU\System\CurrentControlSet\Control\Lsa /f /v restrictanonymoussam /t REG_DWORD /d 00000002

    REG ADD HKCU\System\CurrentControlSet\Control\Lsa /f /v restrictanonymous /t REG_DWORD /d 00000002

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /f /v EnableFirewall /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /f /v DefaultInboundAction /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /f /v DefaultOutboundAction /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /f /v DoNotAllowExceptions /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /f /v EnableFirewall /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /f /v DefaultInboundAction /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /f /v DefaultOutboundAction /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile /f /v DoNotAllowExceptions /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /f /v EnableFirewall /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /f /v DefaultInboundAction /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /f /v DefaultOutboundAction /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile /f /v DoNotAllowExceptions /t REG_DWORD /d 00000001

    ------

    sc stop TermService

    sc stop Netlogon

    sc stop RemoteRegistry

    sc start SharedAccess

    sc stop FastUserSwitchingCompatibility

    sc stop NetTcpPortSharing

    sc stop RemoteAccess

    sc stop TlntSvr

    sc stop WebClient

    taskkill /f /im iexplore.exe

    explorer.exe

    REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg\AllowedPaths /f /va

    REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg\AllowedExactPaths /f /va

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters /f /v AutoShareWks /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters /f /v Hidden /t REG_DWORD /d 00000001

    REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server /f /v AllowRemoteRPC /t REG_DWORD /d 00000000

    REG ADD HKLM\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters /f /v Hidden /t

    REG_DWORD /d 00000001 NET USER Administrator NEWPASSWORD

     

    فایل رجیستری

      Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile] "DisableNotifications"=dword:00000000 "EnableFirewall"=dword:00000001 "DoNotAllowExceptions"=dword:00000001 "DisableUnicastResponsesToMulticastBroadcast"=dword:00000000 "DefaultOutboundAction"=dword:00000000 "DefaultInboundAction"=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] "DisableNotifications"=dword:00000000 "EnableFirewall"=dword:00000001 "DoNotAllowExceptions"=dword:00000001 "DisableUnicastResponsesToMulticastBroadcast"=dword:00000000 "DefaultOutboundAction"=dword:00000000 "DefaultInboundAction"=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile] "DisableNotifications"=dword:00000000 "EnableFirewall"=dword:00000001 "DoNotAllowExceptions"=dword:00000001 "DisableUnicastResponsesToMulticastBroadcast"=dword:00000000 "DefaultOutboundAction"=dword:00000000 "DefaultInboundAction"=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server] "AllowRemoteRPC"=dword:00000000 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration] "Password"= "UserName"= [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp] "PortNumber"=dword:1bb1 "UserAuthentication"=dword:00000001 "Username"= [HKEY_CURRENT_USER\System\CurrentControlSet\Control\Lsa] "restrictanonymoussam"=dword:00000002 "restrictanonymous"=dword:00000002 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "NoNetCrawling"=dword:00000001 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\LanmanServer\Parameters]"AutoShareWks"=dword:00000000 "Hidden"=dword:00000001

    تحقیق و تالیف بهمن علیزاده http://unsafe4birds.blogfa.com


    این مطلب تا کنون 71 بار بازدید شده است.
    ارسال شده در تاریخ پنجشنبه 11 دي 1348 [ گزارش پست ]
    منبع
    برچسب ها : dword ,hkey ,stop ,local ,donotallowexceptions ,defaultinboundaction ,dword 00000001 ,dword 00000000 ,hkey local ,00000001 hkey ,00000000 defaultoutboundaction ,defaultoutboundaction dword 00000000 ,00000000 defaultoutboundaction dword ,dword 00000000 def ,
    مربوط به مقاله هکرها را بخار کنید

تبلیغات


    Ads1

پربازدیدترین مطالب

آمار امروز سه شنبه 31 مرداد 1396

تبلیغات

پارس ایرانیک جهت سفارش تبلیغات با ایمیل زیر در ارتباط باشید
mohsen_msl@yahoo.com

آخرین کلمات جستجو شده

تگ های برتر