星空极速可以干什么(What can the sky speed do)_第1页
星空极速可以干什么(What can the sky speed do)_第2页
星空极速可以干什么(What can the sky speed do)_第3页
星空极速可以干什么(What can the sky speed do)_第4页
星空极速可以干什么(What can the sky speed do)_第5页
已阅读5页,还剩7页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、星空极速可以干什么(What can the sky speed do)What can the sky speed do?The 1.6. client identifies and enforces the clientClient Web identification1. After the client has access to the account entered by the user, the account number is added to the recognition character. The algorithm is a specific hash algor

2、ithm for the part or all of the input accountTemporarily called star speed hash A algorithm, access to the account of the star speed hash A algorithm hash value, according to the summary to get a character encoding, added to the front of the account, and then added to the headSpecial characters. not

3、e, the original account if there is the character, then only the in front of the character of the hash computation and eventually come. Compared with real encoding this account,The header has more than one mark character and an encoded character. For example, account number gzDSL83788013163.gd, plus

4、 summary information will become dgzDSL83788013163.gd. header first wordsThe character is the identifying character, and the second bit is the star speed hash, the A algorithm, the hash value, and the corresponding encoding character2, Radius background using star speed project group provides verifi

5、cation algorithm and instruction flow. Support client identification account dialing, for the return of the wrong account, the default use without adding special wordWith the account call again.3, for not using client users to identify, only to a certain probability of successful dial-up (such as 20

6、%), this will lead to ordinary users tend to use the clientHere, and the rapid change of the sky of the users login name, and now is not to change the password, so call 10000 reset password old routine has not worked, it seems that Telecom is indeed constantlyWith the times, pay attention to the bol

7、d part, which is completely out of the way rogue behavior, through the internal action with broadband systems to achieve, note that this is entirely contrary to the ADSL application when the AssociationYes, because the agreement does not have any terms and conditions, the user must use the sky dial,

8、 landing, if the agreement is legally effective, then telecommunications, this is a violation of the law,Seriously violated the right to know and choice of consumers, and in the process of promotion, there is a serious fraud suspectsNow look at the second part:1.1. when telecommunications promotion

9、identification version of the client to a certain extent, broadband verification background, you can shut down from other dial-up software authentication request, to achieve the sky speed dial-up functionNot to be substituted forThe client provides the COM interface, the external system can know tha

10、t the user is dial-up from the client, the document provided by the client, you can also get the client dial the account number, such as pop-upISP page, you can according to the users account, marketing activities1.1.1. collects user information interfacesAfter the first dial-up success, call the ba

11、ckground to provide the collection of information interface, submit the users information. The interface records the client login machine CPU, memory, hard disk, graphics card information, as a backgroundAccurate marketing of important data sources, such as the collection of user configuration is th

12、e most powerful 3D graphics card, you can sell its 3D game1.1.1. collects a list of user processesAfter each dial is successful,Collect a list of processes running on the users machine and submit it to the background at the right time. Record each accounts process tables in the background, and the d

13、atabase costs a lot of money, soNeed to regularly count the progress of the process every night, and regularly delete the corresponding process and accounts, statistics, the process of ranking time, support accurate to the minutes, you can analyze the user at some timeThe most favorite software. Bec

14、ause the process list belongs to the users privacy, the client submits the process list information needs to be encrypted. And the background can choose to control whether or not to open a list of processes to collect users.The system distinguishes the operating system process and the general proces

15、s, for the top 20 common processes, the system gives a certain text descriptionAs with the previous one, you can see that your machines will have no privacy after the installation of the skyThe telecommunications robber behavior has been exposed, compared to what client push is gentle and sheep in g

16、eneral, I wonder if this incident can not through the power of the network, starting point what role?In the face of such flagrant violations, how long can the public remain silent?Please refer to, I hope you all hands-on experiment. Ample food and clothing by working with our own hands.First of all,

17、 in any case, do not let Telecom star speed people enter the door. The installer said that after you installed it, the telecommunications office would call back and ask if the worker installed the softwareJudge the work of the staffOr telecom people come, unplug the box back power, or change the BIO

18、S shield off the hard disk, claiming that the machine is broken, if it is a notebook, you can hide it, let them run in vain, ha ha, give full play to eachSelf imaginationThere is strength, you can install LINUX, BSD call 10000, with the customer service said, no WINDOWS, only LINUX, FREEBSD, MACOS.

19、Dont tell me about the speed of the stars, or youll buy the real moneyWINDOWS FREEBSD, MACOS or LINUX, version of star speed allow Telecom people dumbfoundedInstalled, you can Telecom reset your account, you can modify the MAC address of the network card. Then you can find a reasonable excuse. For e

20、xample, the motherboard, the network card host is broken, replaced the machineYour account number is unboundTelecom has been forced to install this software. It claims that you cant access the Internet if you dont install it, because this software can be said to be the first rogue software, because

21、the user has to worry about itSo its not good on the whole, but if you install the software once, its no use even to format the hard disk and connect it with the XPs own broadband connection, because its the first time you use itThe sky speed adds a HASH code to your account, so whatever you do is a

22、 691 error, but you can use the star speedBenefit, use this software to seal the routing portStar speed modified in disguise the account number or password, this password is obtained by a certain algorithm, we can obtain the password by sniffingIn addition, telecom also binds network cards, MAC swit

23、ches, ports and accounts, and access BRAS (access server). You can dial the Internet when MAC has an account corresponding to it. Bind the network card MAC address, and so onThis is the only computer you can dial to get on the InternetFor ADSL, its not necessarily binding Mac, but binding ports.When

24、 a telephone line receives a local device, a port is required, and each port has a different VC, VP value. Just bind this phone line to this port. This way you areUnbreakable.Speed out of the skyTo reset your Telecom account password, this method is the most simple, but its not necessary to have our

25、 own clothes, to solve the problemBuy a cracked version of broadband routers, this method, the general manufacturers in certain regions of a specific version, should be cracked version of the star speedTplink, dlink, the league, and so on, there are corresponding solutions, but as long as the teleco

26、mmunications frequent updating algorithm, and then the sky speed upgrade version, it is still the same, can not do it really cracked, because softUpdates are always faster than hardwareSky speed V2.5 version encryption method:Rapid star has been out of multiple versions, recently found himself in th

27、is version with the (2.5V14) encryption principle and the previous version with the different. Using the capture software was found in no passwordAny user name, but the user name is different each time, but all before the telecommunications to our user name, add a string of fixed length letters, num

28、bers and symbols mixed stringTelecom to account (assuming Account) to do Hash, you must take the Hash value HThen, attach the Hash value H to the front of the account and change the account number to: H+AccountFinally, when the password is sent to do the hands and feet: put two sixteen hexadecimal n

29、umber in front of the account, the last account changed .The password hasnt changed, but since 0 x 0D and 0 x 0A cant be used as keyboard output for ASCII, so even if you catch the final account, you cant use any other dialer to dial the InternetWe have to first capture software, Ethereal is the bes

30、t because it is free software, cola is also very good, can be a very good view of the user name and password, do not use the D version of sinffer.Not much to say, if your machine is restricted, open grab capture software! Then click the connect button on speed, connect to the Internet after a stop t

31、o capture.This time to get the package, to see if there is no PPP ch, this time to look at the experience, in the end what is the encryption method used, and some places are passwords, encryption using MD5 algorithm, and some user namesMD5 encryption, and some in the user name before adding special

32、ASCII characters.This is only the first step. We added the username and password to the broadband router to verify itBut if you grab the user name, the password contains special characters, such as the return line key, what can we do? We cant fill this character into the routers PPPoE dialer.This ti

33、me but also help to capture tools, we click OK by clicking on the broadband router ADSL account password, get capture information, this time to see the HTTP post pageThis time, restructure the post packageHttp:/WAN_ethernet_pppoe.asp?Then find the data that needs to be sent. Here the value of pun is

34、 the user name and PPW is the passwordHID_QUICK=%5C%27%5C%27&IPMode=3&PUN=bb555bb&PPW=2222&PMTU=1492How to change this time: for example, plus%0d%0a is the translation under the HTTP of the carriage return lineDonghua network users here, according to analysis, is to change the dial-up account, that

35、is, in the account before adding ASCII code 13 and 11 value (using the keyboard can not enter) and 8 parity check code, and then keep up with your original account.Right-click on the desktop my computer, select manage, click Event Viewer in the system, click the source RemoteAccess event, you can fi

36、nd similar usersXXXXXXXX0794836488jxcard uses the word PPPoE8-0 and ADSL successfully established the connection, 0794836488 of which is your original account number, and XXXXXXXX is the telecommunications privateSince the increase of 8 bit checksumThe next step is to figure out how to input the ASCII code that the keyboard cant input into the routing.If youre a TP-LINK router, thats easy to do. After accessing the routing management interface, access the /userRpm/PPPoECfgRpm.htm in the address barWantype=2& amp; acc=%0D%0AXXXXXXXX0794836488&psw=123456&linktype=2& Save=%B

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论