Ntscan metamorphosis scanner usage and FAQ

  

This article details the use of ntscan metamorphosis scanner and some of the frequently encountered problems

ntscan is a scanner that can scan without password protection management Share the user, first fill in the guessed user name and password in the configuration file, the scan log appears on the right side of the scanning process.


Why does the NTscan metamorphosis scanner report poison?

General anti-virus software will report NTscan as a hacking program, causing NTscan to fail. If you want to run NTscan properly, you must turn off the anti-virus software and turn off the installed firewall.

Detailed description of NTscan metamorphosis scanner command

net use \\\\ip\\ipc$ " " /user:" " Create IPC empty link net use \\\\ip\\ipc$ " ; password " /user:"username" establish IPC non-empty link net use h: \\\\ip\\c$ "password" /user:"username" map directly to the other party C: to Local is H: net use h: \\\\ip\\c$ After login, map the other party C: to local H: net use \\\\ip\\ipc$ /del Delete IPC link net use h: /del Delete mapping partner to local Map for H: net user username/password /add establish user net user guest /active:yes activate guest user net user to see which users are net user account name view account properties net localgroup administrators username /add put "user" Add to the administrator to have administrator privileges, note: after the administrator, add s with the net start to see which services are enabled net start service name to open the service; (eg: net start telnet, net start schedule) net stop service name Stop a service net time \\\\ target ip view the other party time net time \\\\ Ip /set Set the local computer time and "target IP" host time synchronization, plus the parameter /yes to cancel the confirmation information net view to see which shares are enabled in the local LAN net view \\\\ip to see which shares are open in the other LAN Net config display system network settings net logoff disconnected share net pause service name pauses a service net send ip "text information" sends a message to the other party net ver network connection type and information being used in the LAN net share view local open Share net share ipc$ open ipc$ share net share ipc$ /del delete ipc$ share net share c$ /del delete C: share net user guest 12345 use guest to log in with password change to 12345 net password password change system Login password netstat -a to see which ports are enabled, commonly used netstat -an netstat -n to check the network connection of the port, commonly used netstat -an netstat -v to see the work in progress netstat -p protocol name example: netstat -p tcq/ip View the usage of a protocol (see tcp/ip protocol usage) netstat -s check All protocol usages in use nbtstat -A ip If one of the ports 136 to 139 is open, you can check the user name of the other party (the user name before 03) - Note: Parameter -A is uppercase tracert - parameter Ip (or computer name) trace route (packet), parameter: "-wnumber" is used to set the timeout interval. Ping ip (or domain name) Sends the default size to 32 bytes of data to the host. Parameters: "-l[space] packet size";"-nNumber of sent data";"-t" Always ping. Ping -t -l 65550 ip death ping (send more than 64K files and ping has become a death ping) ipconfig (winipcfg) for windows NT and XP (windows 95 98) view local ip address, ipconfig available parameters " ;/all"Display all configuration information tlist -t Display the process in a tree row list (additional tool for the system, the default is not installed, in the Support/tools folder of the installation directory) kill -F process name plus -F parameter After forced to end a process (additional tools for the system, the default is not installed, in the Support /tools folder of the installation directory) del - F file name plus -F parameters can delete read-only files, /AR, /AH, /AS, and /AA indicate deletion of read-only, hidden, system, and archive files respectively. /AR, /AH, /AS, /AA means deleting files other than read-only, hidden, system, and archive. For example, "DEL/AR *.*" means to delete all read-only files in the current directory, "DEL/AS *.*" means to delete all files except the system files in the current directory

NTscan Why can't I remove a weak password?

If it is a user of the intranet, you can only scan the ip of the intranet. Secondly, your machine must break through the thread limit and change to a thousand or so. NTSCAN, X-SCAN and streamer scanners can only scan now. Local ip. So if you are using the 135 port to catch chicken, now you can only catch the local, local ip can be opened "Run" & rdquo; input ipconfig can see, if you want to sweep the external network, use the router to map the port.

Copyright © Windows knowledge All Rights Reserved