请输入您要查询的百科知识:

 

词条 mt.exe
释义

mt.exe是一个进程注册为一个后门的脆弱性,这可能会安装恶意的目的,攻击者允许访问您的计算机从遥远的地点,窃取密码,网上银行及个人资料。这个过程是一个安全风险,应予删除从您的系统。

建议mt.exe :

禁用并删除mt.exe立即。这个过程是最有可能是病毒或木马。

作者:

部分: backdoor.w32.emtee

英语

安全等级 (0-5): 2

间谍软件: No

病毒: No ( Remove mt.exe )

木马: Yes ( Remove mt.exe )

Memory Usage: N/A

System Process: No

Background Process: Yes

Uses Network: Yes

Hardware Related: No

Common mt.exe Errors: N/A

内部指令帮助(需要各位帮助翻译解释):

-filter ---Change TCP/IP filter to on/off status.

-addport ---Add ports to the filter' allowed portlist.

-setport ---Set ports as the filter' allowed portlist.

-nicinfo ---List TCP/IP interface info.

-pslist ---List active processes.

-pskill ---Kill a specified process.

-dlllist ---List dlls of a specified process.

-sysinfo ---List system info.

-shutdown ---Shutdown system.

-reboot ---Reboot system.

-poweroff ---Turn off power.

-logoff ---Logoff current user's session.

(Used in an interactive logon session only.)

-chkts ---Check Terminal Service info.

-setupts ---Install Terminal Service.

-remts ---Remove Terminal Service.

-chgtsp ---Reset Terminal Service port.

-clog ---Clean system log.

-enumsrv ---List all services.

-querysrv ---List detail info of a specified service.

-instsrv ---Install a service.

-cfgsrv ---Changes the configuration of a service.

-remsrv ---Remove a specified service.

-startsrv ---Start a specified service.

-stopsrv ---Stop a specified service.

-netget ---Download from http/ftp.

-redirect ---Port redirect.

-chkuser ---List all account、sid and anti clone.

-clone ---Clone from admin to dest.

-never ---Set account looks like never logged on.

-killuser ---Del account. Even "guest" account.

-su ---Run process as Local_System privilege.

(Usage: mt.exe -su [File] ----Default run cmd.exe)

-findpass ---Show all logged on user's pass.

-netstat ---List TCP connections.

-killtcp ---Kill TCP connection.

-psport ---Map ports to processes.

-touch ---Set the file times for a specified file.

-secdel ---Secure delete files and directory or zap free space.

-regshell ---Enter a console registry editor.

-chkdll ---Detect gina dll backdoor.

但是它也是一个很好的克隆帐户检查工具,克隆帐户是入侵者常使用的一种入侵手段,用mt.exe就可以检查出这样的隐藏帐户。

方法:进入mt目录,输入mt -chkuser命令,查看输出结果,注意比较ExpectedSID与CheckedSID这两个值,如果某个帐户的两个值不一样,则说明有账户被克隆了。几个CheckedSID值都一样的帐户中ExpectedSID与CheckedSID值一样的是正常帐户。

随便看

 

百科全书收录4421916条中文百科知识,基本涵盖了大多数领域的百科知识,是一部内容开放、自由的电子版百科全书。

 

Copyright © 2004-2023 Cnenc.net All Rights Reserved
更新时间:2024/11/15 1:30:11