β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated BleachBit system cleaner for Windows and Linux
twitter.com/undercodeNews
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/bleachbit/bleachbit
2) cd bleachbit
3) to run BleachBit without installation, unpack the tarball and then run these commands:
4) make -C po local # build translations
python3 bleachbit.py
Then, review the preferences.
5) Then, select some options, and click Preview. Review the files, toggle options accordingly, and click Delete.
6) For information regarding the command line interface, run:
python3 bleachbit.py --help
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated BleachBit system cleaner for Windows and Linux
twitter.com/undercodeNews
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/bleachbit/bleachbit
2) cd bleachbit
3) to run BleachBit without installation, unpack the tarball and then run these commands:
4) make -C po local # build translations
python3 bleachbit.py
Then, review the preferences.
5) Then, select some options, and click Preview. Review the files, toggle options accordingly, and click Delete.
6) For information regarding the command line interface, run:
python3 bleachbit.py --help
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE NEWS (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE NEWS (@UndercodeNews). We provides you daily hacking News & Security Warning & Technologies news & Bugs reports & Analysis... @UndercodeNews @UndercodeUpdate @iUndercode @DailyCve. Aus/Leb
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦hack news :Microsoft releases emergency update to fix RCE vulnerabilities in Office and Paint 3D applications
recently from undercode tweets
π¦Microsoft
1) Microsoft explained in its announcement that if an attacker successfully exploited the aforementioned vulnerability, he would be able to obtain the same permissions as the logged-in user, which means that malicious actors can even obtain administrator permissions on the affected machine.
2) Microsoft explained: "There are multiple remote code execution vulnerabilities in Microsoft products, and there will be problems in calling the FBX library when processing certain specially crafted 3D content. An attacker who successfully exploited these vulnerabilities could obtain the same user as the local user. Permissions. For users with fewer permissions, the impact may be smaller. "
3) Microsoft said: "To exploit these vulnerabilities, an attacker must send a specially crafted file containing 3D content to the user and convince the user to open the file. The emergency security update released this time has fixed these vulnerabilities by fixing Microsoft software."
4) These security patches are rated as "Important". It is reported that Microsoft Office 2016, Microsoft Office 2019 and Office 365 ProPlus are affected by the vulnerability.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦hack news :Microsoft releases emergency update to fix RCE vulnerabilities in Office and Paint 3D applications
recently from undercode tweets
π¦Microsoft
1) Microsoft explained in its announcement that if an attacker successfully exploited the aforementioned vulnerability, he would be able to obtain the same permissions as the logged-in user, which means that malicious actors can even obtain administrator permissions on the affected machine.
2) Microsoft explained: "There are multiple remote code execution vulnerabilities in Microsoft products, and there will be problems in calling the FBX library when processing certain specially crafted 3D content. An attacker who successfully exploited these vulnerabilities could obtain the same user as the local user. Permissions. For users with fewer permissions, the impact may be smaller. "
3) Microsoft said: "To exploit these vulnerabilities, an attacker must send a specially crafted file containing 3D content to the user and convince the user to open the file. The emergency security update released this time has fixed these vulnerabilities by fixing Microsoft software."
4) These security patches are rated as "Important". It is reported that Microsoft Office 2016, Microsoft Office 2019 and Office 365 ProPlus are affected by the vulnerability.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ frequency scanning GUI for the OsmoSDR rtl-sdr library -termux root & linux :
t.me/undercodeTesting
π¦Tested on:
Windows 7 (x86 and x64)
Windows 8.1 (x64)
Ubuntu 12.04 (x86)
Ubuntu 12.10 (x64)
Ubuntu 13.04 (x64)
Ubuntu 14.04 (x64)
OS X Snow Leopard
OS X Mountain Lion
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/EarToEarOak/RTLSDR-Scanner
2) cd RTLSDR-Scanner
3) Run 'python -m rtlsdr_scanner'.
To start a scan simple enter the range at the bottom of the window and click 'Start', after a while a plot of signal strengths should be displayed.
'Dwell' controls how long each step is sampled for, longer times will result in more averaging of the signal.
'Continuous update' updates the display on each step. Caution only use this with small scans and low dwell times, otherwise it will become unresponsive.
'Grid' displays a grid on the scan plot.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ frequency scanning GUI for the OsmoSDR rtl-sdr library -termux root & linux :
t.me/undercodeTesting
π¦Tested on:
Windows 7 (x86 and x64)
Windows 8.1 (x64)
Ubuntu 12.04 (x86)
Ubuntu 12.10 (x64)
Ubuntu 13.04 (x64)
Ubuntu 14.04 (x64)
OS X Snow Leopard
OS X Mountain Lion
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/EarToEarOak/RTLSDR-Scanner
2) cd RTLSDR-Scanner
3) Run 'python -m rtlsdr_scanner'.
To start a scan simple enter the range at the bottom of the window and click 'Start', after a while a plot of signal strengths should be displayed.
'Dwell' controls how long each step is sampled for, longer times will result in more averaging of the signal.
'Continuous update' updates the display on each step. Caution only use this with small scans and low dwell times, otherwise it will become unresponsive.
'Grid' displays a grid on the scan plot.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Disney+ Hotstar vip & trial
jayasreekosal@yahoo.com:jaisriram = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-13 |
shrimayeepuhan@gmail.com:munmun |
| Expiry(yyyy-MM-dd) = 2020-08-10 |
avadhutchendake@gmail.com:anjali123 | Title = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-17 |
bindalrahil@gmail.com:bindal1972 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-24 |
sanjay4441@gmail.com:safyeast | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-23 |
manasheerajesh@gmail.com:raje8601 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2022-01-30 |
notes2jyoti@gmail.com:tyroon09 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-08 |
abhishekss.barwal3@gmail.com:cgsa123369 | Title = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-02-16 |
santhoshkumar.ts1012@gmail.com:Muruga01 Telegram Title = Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-05-05 |
swarajksahoo@gmail.com:kumar123 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-08 |
prasad.penter@gmail.com:prasad1432 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-21 |
rimpi.ghosh12@gmail.com:aryaman13 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-15 |
abhishekraj222@gmail.com:abhishek | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-16 |
vipulsingh17@gmail.com:udbhav17 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-07-08 |
adityabahuguna@gmail.com:adi007 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-05-29 |
smabbas79@gmail.com:halloween1 Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-11 |
aafrin.shaikh7788@gmail.com:aafrps123 | = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-04 |
deepti.azad92@gmail.com:ilmp17 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-11-07 |
gautamaro@gmail.com:jaimataki | Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-04-29 |
gautampatade11@gmail.com:7264rani | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-06 |
sanjanabolleypally31@yahoo.com:Omsairam123 | Telegram Title = | Expiry(yyyy-MM-dd) = 2020-06-19 |
mallu.asthy@gmail.com:tanitan79 |
santhoshkumar.ts1012@gmail.com:Muruga01 Telegram Title = Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-05-05 |
adityap91@gmail.com:72132028 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-06-08 |
Partha_Kulkarni@mentor.com:psgp2238 | = Disney+ Hotstar Premium Annual | Expiry(yyyy-MM-dd) = 2020-12-17 |
rajiv_arya3@yahoo.com:jhinjhan | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-02-21 |
sarojsingh_4@yahoo.co.in:write2me | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-01-27 |
notes2jyoti@gmail.com:tyroon09 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-08
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Disney+ Hotstar vip & trial
jayasreekosal@yahoo.com:jaisriram = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-13 |
shrimayeepuhan@gmail.com:munmun |
| Expiry(yyyy-MM-dd) = 2020-08-10 |
avadhutchendake@gmail.com:anjali123 | Title = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-17 |
bindalrahil@gmail.com:bindal1972 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-24 |
sanjay4441@gmail.com:safyeast | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-23 |
manasheerajesh@gmail.com:raje8601 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2022-01-30 |
notes2jyoti@gmail.com:tyroon09 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-08 |
abhishekss.barwal3@gmail.com:cgsa123369 | Title = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-02-16 |
santhoshkumar.ts1012@gmail.com:Muruga01 Telegram Title = Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-05-05 |
swarajksahoo@gmail.com:kumar123 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-08 |
prasad.penter@gmail.com:prasad1432 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-21 |
rimpi.ghosh12@gmail.com:aryaman13 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-15 |
abhishekraj222@gmail.com:abhishek | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-16 |
vipulsingh17@gmail.com:udbhav17 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-07-08 |
adityabahuguna@gmail.com:adi007 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-05-29 |
smabbas79@gmail.com:halloween1 Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-11 |
aafrin.shaikh7788@gmail.com:aafrps123 | = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-04 |
deepti.azad92@gmail.com:ilmp17 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-11-07 |
gautamaro@gmail.com:jaimataki | Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-04-29 |
gautampatade11@gmail.com:7264rani | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-06 |
sanjanabolleypally31@yahoo.com:Omsairam123 | Telegram Title = | Expiry(yyyy-MM-dd) = 2020-06-19 |
mallu.asthy@gmail.com:tanitan79 |
santhoshkumar.ts1012@gmail.com:Muruga01 Telegram Title = Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-05-05 |
adityap91@gmail.com:72132028 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-06-08 |
Partha_Kulkarni@mentor.com:psgp2238 | = Disney+ Hotstar Premium Annual | Expiry(yyyy-MM-dd) = 2020-12-17 |
rajiv_arya3@yahoo.com:jhinjhan | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-02-21 |
sarojsingh_4@yahoo.co.in:write2me | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-01-27 |
notes2jyoti@gmail.com:tyroon09 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-08
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Android unlock crack method by undercode :
> Ransomware when your Android phone is locked? Can you only give money obediently? Take a look at this tutorial to crack the unlock method, and then pack all the tools together!
π¦ REQUIRED TOOLS :
> Android emulator (RE file manager)
> Huawei ADB driver
> ApkIDE less month version
π¦ππΌπ' π πππΈβπ :
1) First, after running the main program to get the ROOT program, the phone will be automatically restarted after it is stuck, and then you will get the following directly
2) Start learning to decompress because the virus of the previous author directly obtains an SO file to decompress to get the installation package, and then directly run the tool to get the process name, disable and delete it (I just stuck this step for an afternoon) I started to simply think that it was over The main program can be opened,
<> Then decompile wifikill pro to get smdev.wifikillpro.com, then run am force-stop smdev.wifikillpro.com and found that it is not useful! I am desperate!
3) hen go to the big file in the main program to change it to ZIP, and then use the Android emulator to get the virus program released by the main program
> Forgot to install the file manager at the beginning of the Android emulator test,
It took many and many times to submit the package of the virus program
4) After obtaining the basic information of the virus program, you can perform a decompilation: cia.apk (virus package name) com....
> Start process killing and virus deletion. Return to the "Mobile Sample Analysis" command to ban the virus program, and then go to the mobile phone homepage > see screanshoat by undercode
>
π¦ Android unlock crack method by undercode :
> Ransomware when your Android phone is locked? Can you only give money obediently? Take a look at this tutorial to crack the unlock method, and then pack all the tools together!
π¦ REQUIRED TOOLS :
> Android emulator (RE file manager)
> Huawei ADB driver
> ApkIDE less month version
π¦ππΌπ' π πππΈβπ :
1) First, after running the main program to get the ROOT program, the phone will be automatically restarted after it is stuck, and then you will get the following directly
2) Start learning to decompress because the virus of the previous author directly obtains an SO file to decompress to get the installation package, and then directly run the tool to get the process name, disable and delete it (I just stuck this step for an afternoon) I started to simply think that it was over The main program can be opened,
<> Then decompile wifikill pro to get smdev.wifikillpro.com, then run am force-stop smdev.wifikillpro.com and found that it is not useful! I am desperate!
3) hen go to the big file in the main program to change it to ZIP, and then use the Android emulator to get the virus program released by the main program
> Forgot to install the file manager at the beginning of the Android emulator test,
It took many and many times to submit the package of the virus program
4) After obtaining the basic information of the virus program, you can perform a decompilation: cia.apk (virus package name) com....
> Start process killing and virus deletion. Return to the "Mobile Sample Analysis" command to ban the virus program, and then go to the mobile phone homepage > see screanshoat by undercode
>
5) Now use RE Manager to delete the virus program. Then delete the main program
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦FRESH PREMIUM PROXIES :
> 103.254.94.17 8080 1 hour ago
3423 ms 15% (68) bd Bangladesh Elite -
125.59.153.98 8380 1 hour ago
881 ms 14% (86) hk Hong Kong - Ho Man Tin Elite -
122.51.183.224 808 1 hour ago
3099 ms 35% (64) cn China - Beijing Elite -
144.76.214.158 1080 1 hour ago
2593 ms 70% (53) de Germany Elite -
117.102.73.44 8182 1 hour ago
4041 ms 18% (70) id Indonesia - Jakarta Elite -
79.104.25.218 8080 1 hour ago
3266 ms 15% (84) ru Russia - Moscow Elite -
94.130.179.24 8044 1 hour ago
1302 ms 13% (77) de Germany Elite -
1.197.203.141 9999 1 hour ago
0 ms 0% (88) cn China - Luohe Elite -
109.174.19.134 8197 1 hour ago
1251 ms 12% (84) ru Russia - Novosibirsk Elite -
80.187.140.26 80 1 hour ago
751 ms 83% (56) de Germany Elite -
31.28.228.252 8080 1 hour ago
3739 ms 9% (86) ua Ukraine - Sevastopol Elite -
58.32.192.53 80 1 hour ago
6252 ms 29% (60) cn China - Shanghai Elite -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦FRESH PREMIUM PROXIES :
> 103.254.94.17 8080 1 hour ago
3423 ms 15% (68) bd Bangladesh Elite -
125.59.153.98 8380 1 hour ago
881 ms 14% (86) hk Hong Kong - Ho Man Tin Elite -
122.51.183.224 808 1 hour ago
3099 ms 35% (64) cn China - Beijing Elite -
144.76.214.158 1080 1 hour ago
2593 ms 70% (53) de Germany Elite -
117.102.73.44 8182 1 hour ago
4041 ms 18% (70) id Indonesia - Jakarta Elite -
79.104.25.218 8080 1 hour ago
3266 ms 15% (84) ru Russia - Moscow Elite -
94.130.179.24 8044 1 hour ago
1302 ms 13% (77) de Germany Elite -
1.197.203.141 9999 1 hour ago
0 ms 0% (88) cn China - Luohe Elite -
109.174.19.134 8197 1 hour ago
1251 ms 12% (84) ru Russia - Novosibirsk Elite -
80.187.140.26 80 1 hour ago
751 ms 83% (56) de Germany Elite -
31.28.228.252 8080 1 hour ago
3739 ms 9% (86) ua Ukraine - Sevastopol Elite -
58.32.192.53 80 1 hour ago
6252 ms 29% (60) cn China - Shanghai Elite -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 hOW to identify and fingerprint Web Application Firewall (WAF) products protecting a website ?
t.me/undercodeTesting
1) To do its magic, WAFW00F does the following:
Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions.
2) If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is.
3) If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to our attacks.
π¦πβπππΈπππππΈπππβ & βπβ :
1) open termux or terminal and type
> git clone https://github.com/EnableSecurity/wafw00f.git
2) cd wafw00f
3) than run as python setup.py
4) $ wafw00f -l
______
/ \
( Woof! )
\ ____/ )
,, ) (_
.-. - _______ ( ||
()``; |==|_______) .)||
/ (' /|\ ( ||
( / ) / | \ . ||
\(_)_)) / | \ |__|
~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit
[+] Can test for these WAFs:
WAF Name Manufacturer
-------- ------------
ACE XML Gateway Cisco
aeSecure aeSecure
AireeCDN Airee
Airlock Phion/Ergon
Alert Logic Alert Logic
AliYunDun Alibaba Cloud Computing
Anquanbao Anquanbao
AnYu AnYu Technologies
....
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 hOW to identify and fingerprint Web Application Firewall (WAF) products protecting a website ?
t.me/undercodeTesting
1) To do its magic, WAFW00F does the following:
Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions.
2) If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is.
3) If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to our attacks.
π¦πβπππΈπππππΈπππβ & βπβ :
1) open termux or terminal and type
> git clone https://github.com/EnableSecurity/wafw00f.git
2) cd wafw00f
3) than run as python setup.py
4) $ wafw00f -l
______
/ \
( Woof! )
\ ____/ )
,, ) (_
.-. - _______ ( ||
()``; |==|_______) .)||
/ (' /|\ ( ||
( / ) / | \ . ||
\(_)_)) / | \ |__|
~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit
[+] Can test for these WAFs:
WAF Name Manufacturer
-------- ------------
ACE XML Gateway Cisco
aeSecure aeSecure
AireeCDN Airee
Airlock Phion/Ergon
Alert Logic Alert Logic
AliYunDun Alibaba Cloud Computing
Anquanbao Anquanbao
AnYu AnYu Technologies
....
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦what is 3389 port detailed introduction by undercode
instagram.com/undercodeTesting
1) 3389 originally refers to the 3389 port of the computer, which is generally used to refer to the remote desktop and can be modified. It is not a Trojan horse program, but if it is not necessary, the hacker base recommends shutting down the service. Originally refers to the 3389 port of the computer
2) Because it belongs to the initial port of the remote desktop of WINDOWS [can be modified]
3) 3389 is generally used to refer to the remote desktop
4) Microsoft's remote desktop is set to facilitate the majority of computer administrators to remotely manage their own computers,
5)But as long as there is a management password, 3389 can provide services for anyone with a management password ...
6) Most hackers like to open a 3389 on the broiler,
7) Because 3389 is the normal service of the system, it is also very convenient to use.
8) It can achieve the same effect as the remote control software such as Grey Pigeon, the main thing is that it is a normal service ...
9) 3389 is easy to get through various scanning tools (such as superscan \ x-scan, etc.). Because some computer users lack security awareness, they often leave the administrator \ new account password blank, so that rookies can use mstsc.exe to log in to others in GUI mode. In order to prevent others from using 3389 to log in to the computer, it is best to set a password for each account or close the port with a firewall. 3389 is recommended to close.
π¦ To close port 3389:
10 ) Firstly, port 3389 is the port opened by the remote management terminal of windows. It is not a Trojan horse program. Please make sure whether the service is opened by yourself. If it is not necessary, it is recommended to close the service.
11) win2000 server Start-> Programs-> Administrative Tools-> Terminal Services is found in the service, select the property option to change the startup type to manual, and stop the service.
12) win2000 pro start-> Settings-> Control Panel-> Administrative Tools-> find Terminal Services service item in the service, select the property option to change the startup type to manual, and stop the service.
13) How to close windows xp: Right-click on my computer and select Properties-> Remote, remove the ticks in the two options box of Remote Assistance and Remote Desktop.
14) Close port 3389 through the registry
15) start operation
Type regedit to open the registry
[HKEY_LOCAL_MACHINE \ System \ control \ Terminalserver \ wds \ rdpwd \ tds \ tcp branch, select the key value named portnumber, change its 3389 to other (such as 1234) look at my operation here, there are 2 control controlcontrol001 One by one advanced controlSET001 then controlSET002
16) Below we are looking at currentcontrolset
[HKEY_LOCAL_MACHINE \ System \ currentcontrolset \ control \ Terminalserver \ winstations \ RDP-Tcp \ PortNumber branch should have one or many similar subkeys, the same change his value 3389 to other (such as 1234)
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦what is 3389 port detailed introduction by undercode
instagram.com/undercodeTesting
1) 3389 originally refers to the 3389 port of the computer, which is generally used to refer to the remote desktop and can be modified. It is not a Trojan horse program, but if it is not necessary, the hacker base recommends shutting down the service. Originally refers to the 3389 port of the computer
2) Because it belongs to the initial port of the remote desktop of WINDOWS [can be modified]
3) 3389 is generally used to refer to the remote desktop
4) Microsoft's remote desktop is set to facilitate the majority of computer administrators to remotely manage their own computers,
5)But as long as there is a management password, 3389 can provide services for anyone with a management password ...
6) Most hackers like to open a 3389 on the broiler,
7) Because 3389 is the normal service of the system, it is also very convenient to use.
8) It can achieve the same effect as the remote control software such as Grey Pigeon, the main thing is that it is a normal service ...
9) 3389 is easy to get through various scanning tools (such as superscan \ x-scan, etc.). Because some computer users lack security awareness, they often leave the administrator \ new account password blank, so that rookies can use mstsc.exe to log in to others in GUI mode. In order to prevent others from using 3389 to log in to the computer, it is best to set a password for each account or close the port with a firewall. 3389 is recommended to close.
π¦ To close port 3389:
10 ) Firstly, port 3389 is the port opened by the remote management terminal of windows. It is not a Trojan horse program. Please make sure whether the service is opened by yourself. If it is not necessary, it is recommended to close the service.
11) win2000 server Start-> Programs-> Administrative Tools-> Terminal Services is found in the service, select the property option to change the startup type to manual, and stop the service.
12) win2000 pro start-> Settings-> Control Panel-> Administrative Tools-> find Terminal Services service item in the service, select the property option to change the startup type to manual, and stop the service.
13) How to close windows xp: Right-click on my computer and select Properties-> Remote, remove the ticks in the two options box of Remote Assistance and Remote Desktop.
14) Close port 3389 through the registry
15) start operation
Type regedit to open the registry
[HKEY_LOCAL_MACHINE \ System \ control \ Terminalserver \ wds \ rdpwd \ tds \ tcp branch, select the key value named portnumber, change its 3389 to other (such as 1234) look at my operation here, there are 2 control controlcontrol001 One by one advanced controlSET001 then controlSET002
16) Below we are looking at currentcontrolset
[HKEY_LOCAL_MACHINE \ System \ currentcontrolset \ control \ Terminalserver \ winstations \ RDP-Tcp \ PortNumber branch should have one or many similar subkeys, the same change his value 3389 to other (such as 1234)
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β