亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? registry.html

?? a collection of mega hacking tools
?? HTML
?? 第 1 頁 / 共 2 頁
字號:
<html>

<head>

<title>Windows NT Registry Tutorial</title>

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">

</head>

<body bgcolor="#000000" text="#ffffff" link="#ffffff" vlink="#ffffff">

<div align="center">

<table width="680" border="0" cellspacing="2" cellpadding="2" align="center">

  <tr>

    <td width="693">

      <pre>

                        :::::::::   ::::::::  :::::::::  ::::::::::

                        :+:    :+: :+:    :+: :+:    :+: :+:

                        +:+    +:+ +:+        +:+    +:+ +:+

                        +#++:++#+  +#++:++#++ +#++:++#:  :#::+::#

                        +#+    +#+        +#+ +#+    +#+ +#+

                        #+#    #+# #+#    #+# #+#    #+# #+#

                        #########   ########  ###    ### ###



              	             <a href="http://blacksun.box.sk" target="_blank">http://blacksun.box.sk</a>

                           _____________________________

    ______________________I       <b>   Topic:</b>             I_____________________

   \                      I                             I                    /

    \     HTML by:        I    <b>Windows NT Registry</b>      I   Written by:     /

    >                     I          <b>Tutorial</b>           I                  <

   /      <a href="mailto:black_mesa@hacktik.org">Martin L.</a>       I_____________________________I   <a href="mailto:nijjerm@cadvision.com">Jatt</a>            \

  /___________________________>                    <_________________________\</pre>

    </td>

  </tr>

</table>

</div>

<p>Version 1.0, 6.8.1999</p>

<p>Note: most of what's written in this tutorial applies to Windows 9x as well.<p>

<h3>What is the Registry?</h3>

<p>The Registry is the central core registrar for Windows NT. Each NT workstation for server has its own Registry,

and each one contains info on the hardware and software of the computer it resides on. For example, com port

definitions, Ethernet card settings, desktop setting and profiles, and what a particular user can and cannot do

are stored in the Registry. Remember those ugly system INI files in Windows 3.1? Well, they are all included with

even more fun stuff into one big database called the Registry in NT.</p>

<p>One of the main disadvantages to the older .INI files is that those files are flat text files, which are

unable to support nested headings or contain data other than pure text. Registry keys can contain nested headings

in the form of subkeys. These subkeys provide finer details and a greater range to the possible configuration

information for a particular operating system. Registry values can also consist of executable code, as well as

provide individual preferences for multiple users of the same computer. The ability to store executable code within

the Registry extends its usage to operating system and application developers. The ability to store user-specific

profile information allows one to tailor the environment for specific individual users.</p>

<p>Always make sure that you know what you are doing when changing the registry or else just one little mistake

can crash the whole system. That's why it's always good to back it up!</p>

<p>To view the registry of an NT server (or to back it up), you need to use the Registry Editor tool. There are

two versions of Registry Editor:</p>

<blockquote>

<ul>

  <li>:Regedt32.exe has the most menu items and more choices for the menu items. You can search for keys and subkeys

       in the registry.</li>

  <li>:Regedit.exe enables you to search for strings, values, keys, and subkeys. This feature is useful if you want

       to find specific data.</li>

</ul>

</blockquote>

<h3>Some Info on NT:</h3>

<p>32 bit GUI Windows networking (client server model) Operating System. 1st version: 3.1 (circa 1994), then 3.5,

then 3.51, then 4.0 (most used and this version was the 1st to adopt the same GUI as Windows 95). NT stands for New

Techology. NT's main competitor is Novel Netware which is more established and has been around longer as a network

operating system. Despite that, it is losing market share to NT and Linux.  That's why NT is becoming a little bit more

important. Windows 2000 which is supposedly the next version is supposed to be out sometime in October 1999. This version

formerly called Cairo has been delayed 3 times over the last 2-3 years. Everything in this tutorial directory relates to

Windows NT v. 4.0 . Some of this might also be useful for Windows 95 and Windows 98 but please note that despite the

similar GUI environments all of them have major differences between each other and each are distinct. The major

difference is security, with NT there is a decent degree of security and robustness. With Windows 95, and 98 there is

hardly any security at all. For example with NT you cannot log in without a password and a username that is correct.

With Windows 98/95, just hit the cancel button on the log on menu (which is not usually enabled anyways) and you will

get into the system. With NT, you can have a network from anywhere from 20-20,000 users or so on the same domain.

Each Domain will have a Primary Domain Controller (PDC) and a few Backup Domain Controllers (BDC's).  There is only

one PDC in a domain, it is the main server that holds all the log in info and does most of the work.  BDC's are

backups in case the PDC gets to busy such as  multiple users logging in at the same time. PDC has all the official

settings for the entire domain (in most cases an entire network) on it.  BDC's usually have partial and not right

up-to-date settings and information on it.  Backing up the Registry of your PDC (Primary Domain Controller) is an

important part of disaster prevention, because it contains all of your user accounts. If you ever have to rebuild a

PDC from scratch, then you can restore your user accounts by restoring the Registry.</p>

<h3>Backup and Restore:</h3>

<p>Even with Windows 98, and Windows 95  you can not just backup the registry when you back up files. What you

would need to do is run either: regedit32.exe  (for NT)  or regedit.exe  and then click the registry menu, then click

export registry. The next step is to click all, then pick the drive to back up onto (usually a removable drive like

tape, floppy, cd, zip drive, jazz drive etc.) and then hit "ok".  To restore a registry from a backed up version,

enter the registry program the same way, click import registry and click the drive and path where the backup is

and hit "ok". It will restore it back to the previous backed up settings and may require a reboot.</p>

<p>Note: registry backups are saved as .reg files, and they are associated with regedit as default. This means

that once you double-click a .reg file, it's contents will be inserted into your own registry.</p>

<h3>What is SAM?</h3>

<p>SAM is short for Security Accounts Manager, which is located on the PDC and has information on all user

accounts and passwords. Most of the time while the PDC is running, it is being accessed or used.</p>

<h3>What do I do with a copy of SAM?</h3>

<p>You get passwords. First use a copy of SAMDUMP.EXE to extract the user info out of it. You do not need to

import this data into the Registry of your home machine to play with it. You can simply load it up into one of

the many applications for cracking passwords, such as L0phtCrack, which is available from:

<a href="http://www.L0phtCrack.com" target="_blank">http://www.L0phtCrack.com</a></p>

<p>Of interest to hackers is the fact that all access control and assorted parameters are located in the Registry.

The Registry contains thousands of individual items of data, and is grouped together into "keys" or some type of

optional value. These keys are grouped together into subtrees -- placing like keys together and making copies of

others into separate trees for more convenient system access.</p>

<p>The Registry is divided into four separate subtrees. These subtrees are called

<ul>

  <li>HKEY_CLASSES_ROOT</li>

  <li>HKEY_CURRENT_USER</li>

  <li>HKEY_LOCAL_MACHINE</li>

  <li>HKEY_USERS</li>

</ul>

We'll go through them from most important to the hacker to least important to the hacker.</p>

<p>First and foremost is the HKEY_LOCAL_MACHINE subtree. It contains five different keys. These keys are as follows:

<ul>

  <li>SAM and SECURITY - These keys contain the info such as user rights, user and group info for the domain

  (or workgroup if there is no domain), and passwords. In the NT hacker game of capture the flag, this is the flag.

  Bag this and all bets are off.</li>

</ul>

<p>The keys are binary data only (for security reasons) and are typically not accessible unless you are an

Administrator or in the Administrators group. It is easier to copy the data and play with it offline than to work

on directly. This is discussed in a little more detail in section 09-4.

<ul>

  <li>HARDWARE - this is a storage database of throw-away data that describes the hardware components

  of the computer. Device drivers and applications build this database during boot and update it during

  runtime (although most of the database is updated during the boot process). When the computer is

  rebooted, the data is built again from scratch. It is not recommended to directly edit this particular

  database unless you can read hex easily.</li>

</ul>



<p>There are three subkeys under HARDWARE, these are the Description key, the DeviceMap key, and the ResourceMap

key. The Description key has describes each hardware resource, the DeviceMap key has data in it specific to

individual groups of drivers, and the ResourceMap key tells which driver goes with which resource.

<ul>

  <li>SYSTEM - This key contains basic operating stuff like what happens at startup, what device drivers are

  loaded, what services are in use, etc. These are split into ControlSets which have unique system configurations

  (some bootable, some not), with each ControlSet containing service data and OS components for that ControlSet.

  Ever had to boot from the "Last Known Good" configuration because something got hosed? That is a ControlSet stored here.</li>

  <li>SOFTWARE - This key has info on software loaded locally. File associations, OLE info, and some miscellaneous

  configuration data is located here.</li>

</ul>

<p>The second most important main key is HKEY_USERS. It contains a subkey for each local user who accesses

the system, either locally or remotely. If the server is a part of a domain and logs in across the network,

their subkey is not stored here, but on a Domain Controller. Things such as Desktop settings and user

profiles are stored here.</p>

<p>The third and fourth main keys, HKEY_CURRENT_USER and HKEY_CLASSES_ROOT, contain copies of portions of

HKEY_USERS and HKEY_LOCAL_MACHINE respectively. HKEY_CURRENT_USER contains exactly would you would

expect a copy of the subkey from HKEY_USERS of the currently logged in user. HKEY_CLASSES_ROOT contains

a part of HKEY_LOCAL_MACHINE, specifically from the SOFTWARE subkey. File associations, OLE configuration

and dependency information.</p>

<h3>What are hives?</h3>

<p>Hives are the major subdivisions of all of these subtrees, keys, subkeys, and values that make up the

Registry. They contain "related" data. Look, I know what you might be thinking, but this is just how Microsoft

divided things up -- I'm just relaying the info, even I don't know exactly what all the advantages to this

setup are. ;-)</p>

<p>All hives are stored in %systemroot%\SYSTEM32\CONFIG. The major hives and their files are as follows:</p>

<table>

<tr>

  <th>Hive</th>

  <th>File</th>

  <th>Backup File</th>

</tr>

<tr>

  <td>HKEY_LOCAL_MACHINE\SOFTWARE</td>

  <td>SOFTWARE</td>

  <td>SOFTWARE.LOG</td>

</tr>

<tr>

  <td>HKEY_LOCAL_MACHINE\SECURITY</td>

  <td>SECURITY</td>

  <td>SECURITY.LOG</td>

</tr>

<tr>

  <td>HKEY_LOCAL_MACHINE\SYSTEM</td>

  <td>SYSTEM</td>

  <td>SYSTEM.LOG</td>

</tr>

<tr>

  <td>HKEY_LOCAL_MACHINE\SAM</td>

  <td>SAM</td>

  <td>SAM.LOG</td>

</tr>

<tr>

  <td valign="top">HKEY_CURRENT_USER</td>

  <td>USERxxx<br>ADMINxxx</td>

  <td>USERxxx.LOG<br>ADMINxxx.LOG</td>

</tr>

<tr>

  <td>HKEY_USERS\.DEFAULT</td>

  <td>DEFAULT</td>

  <td>DEFAULT.LOG</td>

</tr>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
一片黄亚洲嫩模| 精品国产乱码久久久久久夜甘婷婷 | 男女男精品网站| 欧美国产视频在线| 日韩视频在线观看一区二区| 91美女片黄在线| 国产精品亚洲第一区在线暖暖韩国 | 久久毛片高清国产| 欧美一区二区日韩一区二区| 在线欧美日韩精品| 91亚洲国产成人精品一区二三| 日韩一区二区免费在线观看| 欧美综合在线视频| 色就色 综合激情| 福利一区福利二区| 国产中文字幕精品| 韩国精品久久久| 国产精品99久| 成人激情综合网站| 91在线云播放| 97久久超碰国产精品| 91亚洲资源网| 91福利在线观看| 91蝌蚪porny| 91福利视频久久久久| 欧美影院一区二区| 在线精品视频一区二区| 99久久国产综合精品麻豆| www.色综合.com| 日本精品视频一区二区三区| 一本色道久久综合亚洲91| 色婷婷久久99综合精品jk白丝| 性久久久久久久久| 日本三级亚洲精品| 久久99精品久久久久久久久久久久 | 欧美午夜电影在线播放| 欧美日韩第一区日日骚| 这里只有精品电影| 欧美精品一区二区三区很污很色的| av亚洲精华国产精华| 色婷婷综合久久久| 制服丝袜中文字幕亚洲| 精品噜噜噜噜久久久久久久久试看 | 欧美日韩综合在线| 欧美xxxx老人做受| 国产精品人人做人人爽人人添| 欧美三区在线观看| 日韩欧美亚洲一区二区| 欧美高清在线一区| 亚洲va天堂va国产va久| 国精产品一区一区三区mba桃花| 一区二区久久久久| 久久成人免费电影| 91视频www| 日韩欧美自拍偷拍| 亚洲欧美综合网| 天堂一区二区在线| 国产成人高清视频| 欧美另类z0zxhd电影| 久久久91精品国产一区二区三区| 欧美精品xxxxbbbb| 久久久久久久久久久久电影| 亚洲乱码国产乱码精品精的特点| 国产精品国产馆在线真实露脸| 精品国产a毛片| 夜夜精品视频一区二区| 麻豆国产精品官网| 在线亚洲欧美专区二区| 久久蜜桃一区二区| 日韩av电影天堂| 日本精品裸体写真集在线观看| 成人97人人超碰人人99| 日韩欧美专区在线| 亚洲一卡二卡三卡四卡 | 91麻豆精品国产91久久久使用方法 | 国产精品九色蝌蚪自拍| 日本视频一区二区三区| 在线观看网站黄不卡| 国产日韩一级二级三级| 美女爽到高潮91| 欧美日韩一二三| 亚洲日本电影在线| 99久久精品国产导航| 久久亚洲欧美国产精品乐播| 日韩高清不卡一区二区三区| 在线免费亚洲电影| 亚洲精品免费电影| 99久免费精品视频在线观看| 久久精品一区二区三区不卡| 蜜臀久久99精品久久久画质超高清 | 亚洲欧美在线另类| 国产福利一区二区| 精品成人一区二区三区| 日本视频在线一区| 在线播放亚洲一区| 日韩精品欧美成人高清一区二区| 精品一区二区三区在线视频| 欧美精品一二三区| 日韩中文字幕亚洲一区二区va在线 | 国产精品不卡在线观看| 国产不卡视频在线播放| 精品剧情在线观看| 黄一区二区三区| 26uuu成人网一区二区三区| 久久99精品国产麻豆婷婷洗澡| 成人h动漫精品一区二区| 欧美国产精品专区| 成人精品小蝌蚪| 亚洲桃色在线一区| 色综合久久综合网欧美综合网| 日韩一级黄色片| 精品无码三级在线观看视频| 精品久久久久一区二区国产| 激情综合五月天| 久久久久久影视| 成人一区二区视频| 亚洲欧美日韩久久| 欧美在线视频你懂得| 秋霞电影网一区二区| 26uuu久久天堂性欧美| 成人va在线观看| 亚洲综合激情另类小说区| 91精品国产综合久久久久久久| 国产精品久久久久久久浪潮网站| 亚洲午夜精品在线| 欧美一区二区三区免费在线看| 亚洲欧洲日韩av| 欧美日韩一区二区电影| 毛片av一区二区三区| 欧美激情在线免费观看| 色视频成人在线观看免| 日韩精品一区第一页| 在线观看亚洲成人| 精品影院一区二区久久久| 亚洲欧美在线aaa| 911精品国产一区二区在线| 国产一区美女在线| 亚洲激情六月丁香| 精品动漫一区二区三区在线观看| 美美哒免费高清在线观看视频一区二区| 91视频com| 国产一区二区伦理| 亚洲最新视频在线观看| 久久网这里都是精品| 色婷婷综合视频在线观看| 开心九九激情九九欧美日韩精美视频电影 | 亚洲精品国产品国语在线app| 国产伦精品一区二区三区视频青涩| 欧美日韩视频在线第一区 | 日韩视频免费观看高清在线视频| 国产性色一区二区| 在线中文字幕一区| 高清国产一区二区三区| 日韩福利电影在线观看| 久久奇米777| 欧美日韩国产系列| 波多野结衣在线aⅴ中文字幕不卡| 中文字幕一区免费在线观看| 91麻豆精品91久久久久久清纯| 日本三级亚洲精品| 国产精品视频第一区| 日韩一级成人av| 欧美日韩亚洲综合在线 | 在线观看不卡一区| 福利91精品一区二区三区| 麻豆视频观看网址久久| 亚洲黄色性网站| 国产精品乱人伦一区二区| 精品乱人伦小说| 日韩免费视频线观看| 制服丝袜亚洲网站| 欧美视频一区二区三区四区| 成人深夜视频在线观看| 国产乱码字幕精品高清av| 美国一区二区三区在线播放| 天使萌一区二区三区免费观看| 精品人在线二区三区| 91精品视频网| 欧美日韩精品一区视频| 欧美色倩网站大全免费| 欧美日韩在线不卡| 欧美区在线观看| 欧美午夜在线一二页| 欧美蜜桃一区二区三区| 欧美色图12p| 欧美日韩国产系列| 欧美一区二区视频观看视频| 欧美老肥妇做.爰bbww| 欧美乱熟臀69xxxxxx| 欧美一区二区三区在线看| 日韩欧美一级在线播放| 日韩欧美www| 久久免费电影网| 国产精品理伦片| 亚洲乱码国产乱码精品精小说| 久久噜噜亚洲综合| 亚洲欧洲日本在线| 亚洲一区在线观看网站| 日韩精品欧美精品| 国产福利精品一区二区|