Ìá½»ÐèÇó
*
*

*
*
*
Á¢¼´Ìá½»
µã»÷¡±Á¢¼´Ìá½»¡±£¬±íÃ÷ÎÒÀí½â²¢Í¬Òâ ¡¶»Æ½ð³Ç¿Æ¼¼Òþ˽Ìõ¿î¡·

logo

    ²úÆ·Óë·þÎñ
    ½â¾ö·½°¸
    ¼¼ÊõÖ§³Ö
    ºÏ×÷·¢Õ¹
    ¹ØÓڻƽð³Ç

    ÉêÇëÊÔÓÃ
      »Æ½ð³Ç¹ÙÍøÊµÑéÊÒ | ÄÚÍøÉøÍ¸¡ª»ñÈ¡WindowsÄÚHashÃÜÂë·½·¨×ܽá
      ·¢²¼Ê±¼ä£º2020-08-21 ÔĶÁ´ÎÊý£º 402 ´Î

      ÔÚÄÚÍøÉøÍ¸ÖУ¬µ±¹¥»÷Õß»ñÈ¡µ½ÄÚÍøÄ³Ì¨»úÆ÷µÄ¿ØÖÆÈ¨ºó£¬»áÒé±»¹¥ÏݵÄÖ÷»úÎªÌø°å£¬Í¨¹ýÊÕ¼¯ÓòÄÚÆ¾Ö¤µÈ¸÷ÖÖ·½·¨£¬·ÃÎÊÓòÄÚÆäËû»úÆ÷£¬½øÒ»²½À©´ó×ʲú·¶Î§¡£Í¨¹ý´ËÀàÊֶΣ¬¹¥»÷Õß×îÖÕ¿ÉÄÜ»ñµÃÓò¿ØÖÆÆ÷µÄ·ÃÎÊȨÏÞ£¬ÉõÖÁÍêÈ«¿ØÖÆ»ùÓÚWindows²Ù×÷ϵͳµÄÕû¸öÄÚÍø»·¾³£¬¿ØÖÆÓû»·¾³ÏµÄÈ«²¿»úÆ÷¡£



      WindowsÏ»ƽð³Ç¹ÙÍøÈÏÖ¤»úÖÆ


      WindowsϵĻƽð³Ç¹ÙÍøÈÏÖ¤»úÖÆ×ܹ²ÓÐÁ½ÖÖ£¬Ò»ÖÖÊÇ»ùÓÚNTLMµÄÈÏÖ¤·½Ê½£¬Ö÷ÒªÓÃÔÚÔçÆÚµÄWindows¹¤×÷×é»·¾³ÖУ»ÁíÒ»ÖÖÊÇ»ùÓÚKerberosµÄÈÏÖ¤·½Ê½£¬Ö÷ÒªÓÃÔÚÓò»·¾³ÖС£


      NTLMÈÏÖ¤Á÷³Ìͼ 


      ÕâÀïÖ÷Òª¶ÔNTLMµÄÈÏÖ¤Á÷³Ì×öÒ»ÏÂ˵Ã÷£º


      1¡¢Ê×ÏÈÔÚ¿Í»§¶ËÖÐÊäÈëusername£¬passwordºÍdomain£¬È»ºó¿Í»§¶Ë»á°ÑÃÜÂë½øÐÐHashºóµÄÖµÏÈ»º´æµ½±¾µØ¡£


      2¡¢Client½«usernameµÄÃ÷ÎÄ·¢Ë͸øDC£¨Óò¿Ø£©¡£


      3¡¢DC»áÉú³ÉÒ»¸ö16×Ö½ÚµÄËæ»úÊý£¬Ò²¾ÍÊÇÌôÕ½Â루Challenge£©,È»ºóÔÙ´«»Ø¸øClient¡£


      4¡¢µ±ClientÊÕµ½ÌôÕ½ÂëÒԺ󣬻áÏȸ´ÖÆÒ»·Ý£¬È»ºóºÍ»º´æÖеÄÃÜÂëHashÔÙһͬ»ìºÏHashÒ»´Î£¬»ìºÏºóµÄÖµ³ÆÎªresponse£¬Ö®ºóClientÔÙ½«challenge£¬responseÒÔ¼°usernameÒ»²¢¶¼´«¸øserver¡£


      5¡¢Server¶ËÔÚÊÕµ½client´«¹ýÀ´µÄÕâÈý¸öÖµÒÔºó»á°ÑËüÃǶ¼×ª·¢¸øDC¡£


      6¡¢µ±DC½Óµ½¹ýÀ´µÄÕâÈý¸öÖµµÄÒÔºó,»á¸ù¾Ýusernameµ½Óò¿ØµÄÕ˺ÅÊý¾Ý¿â(ntds.dit)ÀïÃæÕÒµ½¸Ãusername¶ÔÓ¦µÄhash,È»ºó°ÑÕâ¸öhashÄóöÀ´ºÍ´«¹ýÀ´µÄchallengeÖµÔÙ»ìºÏhash¡£


      7¡¢½«»ìºÏºóµÄhashÖµ¸ú´«À´µÄresponse½øÐбȽÏ,ÏàͬÔòÈÏÖ¤³É¹¦,·´Ö®,Ôòʧ°Ü,µ±È»,Èç¹ûÊDZ¾µØµÇ¼,ËùÓÐÑéÖ¤¿Ï¶¨Ò²È«²¿¶¼Ö±½ÓÔÚ±¾µØ½øÐÐÁË¡£

       

      ÔÚWindows2000ÒÔºó£¬Windows»úÆ÷¶¼ÓÃNTLMËã·¨ÔÚ±¾µØ±£´æÓû§µÄÃÜÂ룬ÃÜÂëµÄNTLM¹þÏ£±£´æ


      ÔÚ%SystemRoot%System32configSAMÎļþÖС£Windows²Ù×÷ϵͳÖеÄÃÜÂëÒ»°ãÓÉÁ½²¿·Ö×é³É£ºÒ»²¿·ÖΪLM Hash£¬ÁíÒ»²¿·ÖΪNTLM Hash¡£ÔÚWindowsÖУ¬HashµÄ½á¹¹Í¨³£ÈçÏ£º

      Username£ºRID£ºLM-Hash£ºNT-Hash

       

      ÔÚwindows2000ÒÔºóµÄϵͳÖУ¬µÚÒ»²¿·ÖµÄ LM-hash ¶¼ÊÇ¿ÕÖµ£¬ÒòΪLM-hash¿ÉÒÔºÜÈÝÒ×µÄÆÆ½â£¬ËùÒÔwindows2000Ö®ºóÕâ¸öֵĬÈÏΪ¿Õ£¬ËùÒÔµÚ¶þ²¿·ÖµÄNTLM-hash²ÅÕæÕýÊÇÓû§ÃÜÂëµÄ¹þÏ£Öµ¡£ÔÚÉøÍ¸²âÊÔÖУ¬Í¨³£¿É´ÓWindowsϵͳÖеÄSAMÎļþºÍÓò¿ØÊý¾Ý¿âµÄNTDS.ditÎļþ£¨ÔÚÓò»·¾³ÖУ¬Óû§ÐÅÏ¢´æ´¢ÔÚNTDS.ditÖУ©ÖлñµÃËùÓÐÓû§µÄHash¡£

       

      ʹÓÃPwDump¹¤¾ß»ñÈ¡ÃÜÂëHash


      PwDump7¿ÉÒÔÔÚCMDÏÂÌáÈ¡³öϵͳÖеÄÓû§µÄÃÜÂëhash£¬Ê¹ÓùÜÀíԱȨÏÞÖ±½ÓÔËÐиù¤¾ß¼´¿É£º



      »ñÈ¡µ½Hashºó£¬ÎÒÃÇ¿ÉÒÔÓÃÆÆ½â¹¤¾ßÀ´ÆÆ½âµÃµ½Ã÷ÎÄÃÜÂ룬Ҳ¿ÉÒÔ½øÐйþÏ£´«µÝ¹¥»÷À´ºáÏòÉøÍ¸¡£

       

      ʹÓÃMimikatz¹¤¾ßץȡWindowsÃÜÂë


      MimikatzÊǻƽð³Ç¹ÙÍøÈËÔ±ÔÚÄÚÍøÉøÍ¸¹ý³ÌÖеÄÀûÆ÷£¬ËüÊÇÓÉ·¨¹úµÄһλ´óÉñÑз¢µÄ¡£¹¥»÷Õß¿ÉÒÔͨ¹ýMimikatzÌáÉý½ø³ÌȨÏÞ×¢Èë½ø³Ì¶ÁÈ¡½ø³ÌÄÚ´æ¡£

       

      MimikatzµÄ×î´ó¹¦ÄÜÊÇ¿ÉÒÔÖ±½Ó¶ÁÈ¡Windows²Ù×÷ϵͳµÄÃ÷ÎÄÃÜÂ룬ԭÀíÊÇlsass.exeÊÇWindowsϵͳµÄ»Æ½ð³Ç¹ÙÍø»úÖÆ£¬Ö÷ÒªÓÃÓÚ±¾µØ»Æ½ð³Ç¹ÙÍøºÍµÇ½²ßÂÔ£¬Í¨³£ÔÚÎÒÃǵǽϵͳʱÊäÈëÃÜÂëºó£¬ÃÜÂë±ã»á´æÖüÔÚlsass.exeÄÚ´æÖУ¬¾­¹ýwdigestºÍtspkgÁ½¸öÄ£¿éµ÷Óúó£¬¶ÔÆäʹÓÿÉÄæµÄËã·¨½øÐмÓÃܲ¢´æ´¢ÔÚÄÚ´æÖУ¬¶øMimikatzÕýÊÇͨ¹ý¶Ôlsass.exeÄæËã»ñÈ¡µ½Ã÷ÎÄÃÜÂë¡£

       

      ÐèҪעÒâµÄÊǵ±Ä¿±êΪwin10»ò2012R2ÒÔÉÏʱ£¬Ä¬ÈÏÔÚÄÚ´æÖнûÖ¹±£´æÃ÷ÎÄÃÜÂ룬µ«ÊÇÎÒÃÇ¿ÉÒÔͨ¹ýÐÞ¸Ä×¢²á±íµÄ·½Ê½×¥È¡Ã÷ÎÄ£¬ÊäÈëÒÔÏÂÃüÁî¼´¿É£º


      Reg add HKLMSYSTEMCurrentContro

      lSetControlSecurityProvidersWDigest /vUseLogonCredential /t REG_DWORD /d 1 /f

       

      1¡¢Ö±½Ó¶ÁÈ¡


      Mimikatz¶ÁÈ¡Ã÷ÎÄÃÜÂëºÍhashʱÐèÒª¹ÜÀíԱȨÏÞ¡£

      privilege::debug           //ÌáÉýÖÁdebugȨÏÞ

      sekurlsa::logonpasswords   //ץȡÃÜÂë



      2¡¢Procdump+MimikatzÀëÏß¶ÁÈ¡lsass.dmpÎļþ


      ProcdumpÊÇ΢Èí¹Ù·½·¢²¼µÄ¹¤¾ß£¬¿ÉÒÔÓÃÀ´½«Ä¿±êlsassÎļþµ¼³ö¡£ÏÈÔÚÄ¿±ê»úÆ÷ÉÏÉÏ´«Procdump£¬µ¼³ölsass.dmp

      procdump64.exe-accepteula-ma

      lsass.exe lsass.dmp



      ½«Ä¿±ê»úÉϵÄlsass.dmpÏÂÔØµ½±¾µØºó£¬Ö´ÐÐMimikatzµ¼³ölsass.dmpÀïÃæµÄÃÜÂëºÍhash£º

       

      sekurlsa::minidump Ŀ¼lsass.dmp //½«µ¼³öµÄlsass.dmpÔØÈëµ½MimikatzÖÐ

      sekurlsa::logonpasswords full    //»ñÈ¡ÃÜÂë

       

      3¡¢Í¨¹ýSAMºÍSystemÎļþץȡÃÜÂëºÍHash


      Ê×ÏÈÀûÓÃ×¢²á±íÃüÁĿ±ê»úµÄsam»òÕßsystemÎļþµ¼³ö

      reg save hklmsam sam.hive

      reg save hklmsystem system.hive



      È»ºó½«Ä¿±ê»úÉϵÄsam.hiveºÍsystem.hiveÏÂÔØµ½±¾µØ£¬ÀûÓÃMimikatz¶ÁÈ¡samºÍsystemÎļþ»ñÈ¡NTLMHash£º

       

      token::elevate

      lsadump::sam


       

      WindowsÃÜÂëÆÆ½â·½·¨


      1¡¢ophcrackÔÚÏßÆÆ½â


      ÔÙͨ¹ýÒÔÉϹ¤¾ß»ñÈ¡µ½ÃÜÂëHashºó£¬ÎÒÃÇÐèÒª¶ÔÆä½øÐÐÆÆ½â£¬ÒԵõ½Ã÷ÎÄÃÜÂë¡£OphcrackÍøÕ¾https://www.objectif-securite.ch/en/ophcrackÌṩÁËÔÚÏßHashÆÆ½â·þÎñ£¬ÎÒÃǽ«µÃµ½µÄNTLM HashÊäÈëµ½µÚÒ»¸ö²éѯ¿òÄÚ£¬µã»÷GO¼´¿É½øÐÐÆÆ½â£¬Ð¡ÓÚ14λµÄÃÜÂëÒ»°ãÔÚ¼¸·ÖÖÓÄھͿÉÒÔÆÆ½âÍê³É£º


      2¡¢ophcarck¹¤¾ßÆÆ½â

      OphcrackÊÇÒ»¿îWindowsÃÜÂë¹þÏ£ÖµÆÆ½â¹¤¾ß£¬ÔÚËüµÄ¹ÙÍøÎªÎÒÃÇÌṩÁ˼¸Ê®GBµÄ¹þÏ£±í¡£²Êºç±íÏÂÔØµØÖ·£º
      https://ophcrack.sourceforge.io/tables.php

       

      ·À·¶´ëÊ©


      1¡¢¸üв¹¶¡

      ΢ÈíΪÁË·ÀÖ¹Óû§µÄÃ÷ÎÄÃÜÂëÔÚÄÚ´æÖÐй¶£¬·¢²¼ÁËKB2871997²¹¶¡£¬¹Ø±ÕÁËWdigest¹¦ÄÜ¡£Windows Server 2012¼°ÒÔÉϰ汾ĬÈϹرÕWdigest£¬Ê¹¹¥»÷ÕßÎÞ·¨´ÓÄÚ´æÖлñÈ¡Ã÷ÎÄÃÜÂë¡£Windows Server 2012ÒÔϰ汾£¬Èç¹û°²×°ÁËKB2871997²¹¶¡£¬¹¥»÷ÕßͬÑùÎÞ·¨»ñÈ¡Ã÷ÎÄÃÜÂë¡£ 2¡¢¹Ø±ÕWdigest Auth

      Èç¹ûÎÞ·¨¸üв¹¶¡£¬ÐèÒªÊÖ¶¯¹Ø±ÕWdigest Auth£¬ÔÚCMDÖÐÊäÈëÒÔÏÂÃüÁreg add HKLMSYSTEMCurrentControlSet
      ControlSecurityProvidersWDigest /vUseLogonCredential /t REG_DWORD /d 0 /f  // ¹Ø±ÕWdigest Auth

      ÐèÒª½«UseLogonCredentialµÄÖµÉèΪ0£¬È»ºó×¢Ïúµ±Ç°Óû§£¬ÖØÐµÇ½¼´¿É¡£



      Ãâ·ÑÊÔÓÃ
      ·þÎñÈÈÏß

      ÂíÉÏ×Éѯ

      400-811-3777

      »Øµ½¶¥²¿
      ¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿