黑客如何通過使用你的ip地址和埠號來入侵你的電腦,我們又該如何防範
Step 6 : Now telnet will ask for credentials such as username and password .Just type Username and Password ,then hit Enter.If you don’t know username and password , try some guesses like – ” admin ” , ” administrator ”
How to access target’s PC after successful connection ?
To gain access in PC , use CMD(command prompt) .Sorry no GUI ,you have to access all files music , database from CMD .Don’t worry it’s not as such difficult ,use CMD commands like ” cd / “to change directory.
Now How Can I Protect Myself ?
First ,install a Firewall program or use windows firewall but we recommend Comodo firewall, it’s really incredible and ability to filter ports .It has pre-configured settings , so user just install it and start using (ready to serve).Don’t worry about price it’sfree.
Conclusion :
It’s like a open door From above demo ,you learned about ports scanning , open ports and it’s uses, also basic knowledge about Hacking remote PC by hackers.If you have any security related questions ,feel free to ask.