Team : FreeXploiT
Author : ALLyeSNO
Date : 2005-2-7
G:/test>type/?
显示文本文件的内容。
TYPE [drive:][path]filename
当然type还有其他用途
G:/test>type mm.exe>allyesno.exe
G:/test>allyesno
VNCrackX4
by Phenoelit (http://www.phenoelit.de/)
Usage:
Online: ./vncrack -h target.host.com -w wordlist.txt [-opt's]
Windows interactive mode: ./vncrack -W
enter hex key one byte per line - find it in
/HKEY_CURRENT_USER/Software/ORL/WinVNC3/Password or
/HKEY_USERS/.DEFAULT/Software/ORL/WinVNC3/Password
Options for online mode:
-v verbose (repeat -v for more)
-p P connect to port P instead of 5900
Options for PHoss intercepted challages:
-c <challange> challange from PHoss output
-r <response> response from PHoss output
G:/test>
G:/test>type nul>mm.exe
G:/test>dir mm.exe
G:/test 的目录
2005-02-07 21:48 上午 0 mm.exe
1 个文件 0 字节
0 个目录 358,486,016 可用字节
G:/test>