What is IPC?

IPC (Inter-Process Communication)

IPC (How many instructions the CPU executes per clock cycle)

IPC represents the design architecture of a processor, and once the processor design is complete, the IPC value does not change. Here, the IPC value is the deciding factor, and frequency no longer seems to take precedence over everything else.

In reality, it is frequency and IPC that really affect CPU performance. The exact standard for CPU performance should be: CPU performance = IPC (how many instructions the CPU executes per clock cycle) x frequency (MHz clock speed), a formula originally proposed by Intel and widely recognized by the industry.

If you compare Intel's 800MHz Anthem processor (Intel's top-of-the-line CPU) for enterprise servers with the 1800MHz Pentium 4 processor for desktops, you'll find that the 800MHz Anthem processor is even more powerful than the 1800MHz Pentium 4 processor in terms of performance.

IPC Inter-Process Communication

IPC (Internet Process Connection) is a resource that ****enjoys the use of "named pipes", which are named pipes that are open for inter-process communication, and that provide trusted usernames and passphrases so that the two parties involved can establish a secure channel through which to exchange encrypted data, thus enabling access to remote computers. This enables access to remote computers. ipc is a new feature of NT/2000, which has the feature that only one connection is allowed to be established between two ip's at the same time. while providing the ipc feature, NT/2000 also turns on the default *** enjoyment during the initial installation of the system, i.e., all logical *** enjoyments (c,d,e ......) and the system directory winnt or windows (admin)*** enjoy. All of these, Microsoft's original intention was to facilitate the administrator's management, but consciously or unconsciously, it led to a reduction in system security.

We usually always hear people talking about ipc vulnerability, ipc vulnerability, in fact, ipc is not a real sense of vulnerability, I think the reason why some people say so, it must be referring to Microsoft's own placement of the 'backdoor': empty session (Null session).

IPC is an industrial personal computer (Industrial Personal Computer─IPC) is a reinforced and enhanced personal computer, which can be used as an industrial controller to operate reliably in industrial environments. As early as the early 80's, the United States AD company launched a similar IPC MAC-150 industrial control machine, followed by the United States IBM formally launched the industrial personal computer IBM7532. due to the IPC's reliable performance, rich software, low price, and in the industrial control machine in the emergence of the later on, the application of the increasingly wide range. At present, IPC has been widely used in communications, industrial control site, road and bridge tolls, medical, environmental protection and all aspects of people's lives.

IPC technical characteristics:

1, in line with the "EIA" standard steel industrial chassis, enhance the ability to resist electromagnetic interference.

2. Adopting bus structure and modular design technology, the CPU and each functional module use the plug-in board structure with soft locking lever, which improves shock and vibration resistance.

3. The chassis is equipped with dual fans, positive pressure convection exhaust, and a dust filter to prevent dust.

4. Equipped with highly reliable industrial power supply and over-voltage and over-current protection.

5. The power supply and keyboard are equipped with electronic lock switches to prevent illegal opening, closing and illegal keyboard input.

6, with self-diagnostic function.

7. I/O templates are available on request.

8, with a "watchdog" timer, in the case of failure, without human intervention and automatic reset.

9, openness, good compatibility, absorbing all the functions of the PC, can directly run a variety of PC application software.

10, can be configured with real-time operating system, easy to multi-task scheduling and running.

11, can be used passive motherboard (backplane), easy to upgrade the system.

IPC main structure:

1, all-steel chassis

IPC's all-steel chassis is designed according to the standard, anti-shock, anti-vibration, anti-electromagnetic interference, and can be mounted on the PC-bus-compatible passive motherboard.

2, passive backplane

Passive backplane slots by the ISA and PCI bus multiple slots, ISA or PCI slot number and location according to the need to have a certain choice, the board for the four-layer structure, the middle two layers were the ground layer and the power supply layer, the structure of the board can be weakened by the logic signals on the board of the mutual interference and reduce the power impedance. The bottom board can be plugged with various boards, including CPU card, display card, control card, I/O card, etc. The board can also be used as an interface for the CPU, display card, control card and I/O card.

3. The industrial power supply

is an AT switching power supply with an average trouble-free operation time of 250,000 hours.

4, CPU card

IPC's CPU card has a variety of, according to the size of the card can be divided into long card and half-length card, according to the processor can be divided into 386, 486, 586, PII, PIII motherboards, the user can be based on their own needs arbitrary selection. Its main features are: operating temperature 0-600C; equipped with a "watchdog" timer; low power consumption, the maximum 5V/2.5A.

5, other accessories:

IPC's other accessories are basically compatible with the PC, mainly CPU, memory, graphics cards, hard disk, floppy drive, keyboard, mouse, optical drive, monitor and so on.

IPC's other accessories are basically compatible with PCs.

IPC network intrusion

In order to help you better learn IPC, I am here to specifically organize and improve the concept of IPC, some common commands, in the IPC in some of the causes of the problem and so on, most of the information from the Internet, because I do not know the name of the author, so I can not mark the content of the place, please forgive me.

I, the concept of IPC

IPC $ (Internet Process Connection) is *** enjoy the "named pipe" resources, it is in order to allow inter-process communication and the opening of the named pipeline, by providing a trusted user name and password, connecting the two sides to establish a secure channel and encrypted data exchanged over the channel, thus realizing access to remote computers. This enables access to remote computers. In fact, he is considered a more practical service provided by Microsoft, in the realization of resource **** enjoy this aspect can be said to have played a more important role, just usually used less, and most of them are used by hackers to carry out attacks, and therefore often said to be a loophole. In fact, it is not a real sense of vulnerability, it refers to Microsoft's own placement of the 'back door': empty session (Null session).

The concept of a null session

A null session is a session established with a server without trust. For a null session, the SID of the token provided by LSA (the SID of a null session) is S-1-5-7, the username is: ANONYMOUS LOGON (the system's built-in account), and the access token contains the following disguised groups: Everyone and Network.

II. The process of IPC establishment

1) The session requester (client) transmits a packet to the session receiver (server) requesting the establishment of a secure tunnel;

2) The server generates a random 64-bit number (the realization challenge) to be transmitted back to the client;

3) The client acquires this server-generated 64-bit number, disrupts it with the passphrase of the account trying to establish the session, and returns the result to the server (the realization of the response);

4) the server accepts the response and sends it to the Local Security Authentication (LSA), which verifies the response to confirm the identity of the requester by using the correct passphrase for that user. If the requester's account is local to the server, verification occurs locally; if the requested account is a domain account, the response is transmitted to the domain controller for verification. When the response to the challenge is verified as correct, an access token is generated and then transmitted to the client. The client uses this access token to connect to resources on the server until the proposed session is terminated.

Three IPC connection conditions

★ Related to the operating system (NT/2000/XP can establish an ipc$ connection, 98/ME cannot establish an ipc$ connection);

★ The target host must have ipc$*** enjoyment turned on;

★ The local host must start the Lanmanworkstation service (which provides network linking and communication);

★ The target host must start the Lanmanserver service (which ipc$ relies on to provide RPC support, file, print, and named pipe*** access);

★ The target host must start NetLogon, which supports pass-through account logon identities for computers on the network;

★ The target host must start NetLogon, which supports pass-through account logon identities for computers on the network;

★ The target host must start the ipc$ service.

★ The target host should have NBT enabled (open port 139);

★ The target host's firewall configuration (blocking ports 139 and 445 will also cause the connection to fail);

★ Incorrect username or password;

★ Incorrectly typed commands (be careful about typing spaces, as the username and password do not contain spaces). The user name and password do not contain spaces when the double quotes on both sides can be omitted, the password is empty, directly enter the two quotes "");

★ ★ establish a good connection after the target host reboot, ipc$ connection will be automatically disconnected. firewall settings to filter ports);

Error #67: Network name not found (lanmanworkstation service not started on local host or ipc$ deleted from target host);

Error #1219: Provided credentials conflict with an existing credential set (an ipc$ has been created, it can be deleted and reconnected);

Error No. 1326: The username or password is incorrect;

Error No. 1792: Attempting to log in, the network logon service did not start (the NetLogon service is not started in the target host);

Error No. 2242: The password for this user has expired.

V. Common Passwords

★ To establish a null connection: net use \\\IP\ipc$ """ /user:""

★ To establish a non-null connection: net use \\\IP\ipc$ "password" /user: "username"

★ To view the ****-enjoyment of resources of the remote host (but not see the default***-enjoyment). but you can't see the default *** enjoyment) net view \\IP

★ View the local host's *** enjoyment resources (you can see the local default *** enjoyment) net share

★ Get a list of the remote host's usernames nbtstat -A IP

★ Get a list of the local host's users net user

★ View the current time of the remote host net time \\\IP

★ ★ Show the current services of the local host net start

★ Start/shut down local services net start service name /y net stop service name /y

★ Mapping remote **** enjoy: net use z: \\IP\sihochina This command maps the *** enjoyment resource with *** enjoyment name sihochina to the z-disk

★ Delete *** enjoyment mapping net use z: /del /y Delete mapped z-disk net use * /del /y Delete all

★ Copy file to remote host copy \path\*.exe \\\\IP\sihochina directory name, for example: copy sihochina.exe \\\\IP\c Copy sihochina.exe in the current directory to the other side of the c-disk

★ ★ Remotely add a scheduled task at \\\ip Time Program name, such as: at \\192.168.0.1 11:00 sihochina.exe 11:00 on the host 192.168. 0.1 run sihochina.exe

The method used in this article is mainly in the VISTA flagship SP2 and XP SP2 environment test, other systems did not do the test, but I believe that they are similar, the problem should be similar, I will list my experiments in the two systems of all the problems for your reference.

In addition, if you are a beginner and have no idea about IPC and DOS commands, please read along with the previous article "IPC Basics and IPC-DOS Commands".

Let's get down to business!

First step, press WIN+R to bring up a run box (don't tell me that the WIN key doesn't even know which one it is, that's hopeless! It's the key that opens the start menu, the one with the WINDOWS logo on it), type CMD, and go into DOS.

The second step is to type net use \\\ target IP\ipc$ "password" /user: "username". After typing this, a prompt will be displayed for the successful completion of the command. It is important to note the formatting of the syntax. In this syntax, there are four spaces before and after USE, and one space before and after the password. In addition, it should be noted that the username and password here are the username and password used to log on to the system of the intruder host and not the one used for broadband dial-up. In this process, if the target machine is a VISTA system, then it can be very easy to invade, because the VISTA system Microsoft default SERVER service to open, as long as you know the user name and password can come in. XP is closed, if someone else is using the XP system and you just do experiments then give up. Or you are not dead, make a phone call to someone else to ask someone else to open it! What if they ask you how to turn it on? If you do not know, then, dang, forget it, good people to do in the end, I tell you it, so that you do not have to go to Baidu to find it. Open the "Control Panel - Classic View - Administrative Tools - Services" in the service program to find the SERVER that item, and then find a way to open it! If you don't know how to do it again, then I have no choice!

The third step, enter net view \\\ target IP to see what target open **** enjoy. If the other party has all the resources on the disk are *** enjoy, then it can be said that the invasion has been close to the end of the (in XP default open *** enjoy: printers and so on, and VISTA default almost all the *** enjoy open). But if the other side does not open *** enjoy then we have to find a way to solve this problem. Usually we use telnet service to enter the other computer, and then help him to open the **** enjoy you want. Then how to enter the telnet? This is another big problem. In XP, the telnet service is disabled by default, which means you can not use this service. And VISTA do more absolute, in the service item are not this one, but it does not matter we can add their own. Specific methods are as follows: "Control Panel - enter the Control Panel home page - open or close the WINDOWS function (lower left) - find telnet inside the two items are added on the line". Encountered this situation, such as our type of experiment should have to choose to give up. If you make a phone call to call the other side to remove the disabled, changed to automatic, then the situation is different (modify the method and just open the SERVER is almost the same, here is not detailed), as long as it is not disabled, no matter whether his service has not been opened, we have a way to turn it into an open. I will give you a relatively simple method. First of all, open the "Notepad - enter @net statr telnet" save as opentelnet.bat in the C disk! Here is the use of a batch command to achieve, specifically how to achieve here I will not say more, because today's focus is not it. We do it on the line, but I can tell you that the effect of this command is to open the deactivated telnet service (note that it is deactivated rather than disabled). The next thing we need to do is to copy this file to the root directory of the target machine. The specific operation is:

Step 4, type copy c:\opentelnet.bat \\\\target IP\admin$ This way we have just built that file copied to the other host's root directory. However, in the process of copying may appear in some problems, I have problems when copying to XP, and have not been able to find where the problem is, but copying the failure of some of the following specific reasons, I found from the Internet, now COPY over.

Copying the file prompted an error, the reasons may be the following aspects:

1) blind copy:

Copying the non-existent **** enjoy the file, copying the net view \\\IP command should be used to check the target host's **** enjoy the situation;

2) default **** enjoy the wrong judgment:

★ ipc$***heed and default ****heed are two different things. ipc$***heed is a named pipe, not a specific folder, and default ****heed is not a necessary condition for ipc$***heed;

★ net view \\IP can't show the default ****heed (because of the default ****heed with a $), and we can't judge whether the other side is turned on by this command. default *** enjoy.

★ The target host is blocked from external access to the ****Share by a firewall or security software setting;

4) killed by a firewall or on the LAN

Step 5, run the file. On this to use our at command. The method is as follows: first look at the time of the target machine. Type net time target IP Knowing the target time we can give it a task to run at the requested time. Assuming that the time we just saw is 14:20, then we can type at opentelnet.bat 14:30 \\\ target IP This line of command will cause the target machine to run the file opentelnet.bat at exactly 14:30.

Sixth step, telnet target IP This is to establish a telnet connection with the other side, with this connection we can do anything on other people's computers, damage to the interests of others are prohibited to do, or else shoot to kill.

★ Create a user on the remote host, activate the user, change the user's password, join the management group and other operations;

★ Open the remote host ipc$*** enjoy, default **** enjoy, ordinary **** enjoy the operation;

★ Run/close the remote host services;

★ Start/kill the remote host;

★ The remote host can be used as an interface between the remote host and the computer, and can also be used as an interface between the remote host and the computer, and can be used as an interface between the remote host and the computer.

★ Start/kill processes on the remote host.

The second of these applications is what we're going to do, turn on the host's IPC$*** enjoy (adding a dollar sign actually means that it won't show a hand tray symbol on the other machine after turning on the **** enjoy)

Step 7, first quit telnet, type exit and you're good to go. Then type net use h: \\\ Target IP\c$ The function of this command is to map the other side of the C disk to the h disk of the local area, which h disk can not be the original existing disk of the machine. Mapping, you don't understand? Well, there's no rush. I'll explain: it is to reflect others to their own computers, and then you can perform any operation on it, it is equivalent to their own computers, so far, congratulations, invasion of success