• Ìá½»ÐèÇó
    *
    *

    *
    *
    *
    Á¢¼´Ìá½»
    µã»÷¡±Á¢¼´Ìá½»¡±£¬±íÃ÷ÎÒÀí½â²¢Í¬Òâ ¡¶»Æ½ð³Ç¿Æ¼¼Òþ˽Ìõ¿î¡·

    logo

      ²úÆ·Óë·þÎñ
      ½â¾ö·½°¸
      ¼¼ÊõÖ§³Ö
      ºÏ×÷·¢Õ¹
      ¹ØÓڻƽð³Ç

      ÉêÇëÊÔÓÃ
        »Æ½ð³Ç¹ÙÍøÊµÑéÊÒ | ÄÚÍøÉøÍ¸¡ª»ñÈ¡WindowsÄÚHashÃÜÂë·½·¨×ܽá
        ·¢²¼Ê±¼ä£º2020-08-21 ÔĶÁ´ÎÊý£º 403 ´Î

        ÔÚÄÚÍøÉøÍ¸ÖУ¬µ±¹¥»÷Õß»ñÈ¡µ½ÄÚÍøÄ³Ì¨»úÆ÷µÄ¿ØÖÆÈ¨ºó£¬»áÒé±»¹¥ÏݵÄÖ÷»úÎªÌø°å£¬Í¨¹ýÊÕ¼¯ÓòÄÚÆ¾Ö¤µÈ¸÷ÖÖ·½·¨£¬·ÃÎÊÓòÄÚÆäËû»úÆ÷£¬½øÒ»²½À©´ó×ʲú·¶Î§¡£Í¨¹ý´ËÀàÊֶΣ¬¹¥»÷Õß×îÖÕ¿ÉÄÜ»ñµÃÓò¿ØÖÆÆ÷µÄ·ÃÎÊȨÏÞ£¬ÉõÖÁÍêÈ«¿ØÖÆ»ùÓÚWindows²Ù×÷ϵͳµÄÕû¸öÄÚÍø»·¾³£¬¿ØÖÆÓû»·¾³ÏµÄÈ«²¿»úÆ÷¡£



        WindowsÏ»ƽð³Ç¹ÙÍøÈÏÖ¤»úÖÆ


        WindowsϵĻƽð³Ç¹ÙÍøÈÏÖ¤»úÖÆ×ܹ²ÓÐÁ½ÖÖ£¬Ò»ÖÖÊÇ»ùÓÚNTLMµÄÈÏÖ¤·½Ê½£¬Ö÷ÒªÓÃÔÚÔçÆÚµÄWindows¹¤×÷×é»·¾³ÖУ»ÁíÒ»ÖÖÊÇ»ùÓÚKerberosµÄÈÏÖ¤·½Ê½£¬Ö÷ÒªÓÃÔÚÓò»·¾³ÖС£


        NTLMÈÏÖ¤Á÷³Ìͼ 


        ÕâÀïÖ÷Òª¶ÔNTLMµÄÈÏÖ¤Á÷³Ì×öÒ»ÏÂ˵Ã÷£º


        1¡¢Ê×ÏÈÔÚ¿Í»§¶ËÖÐÊäÈëusername£¬passwordºÍdomain£¬È»ºó¿Í»§¶Ë»á°ÑÃÜÂë½øÐÐHashºóµÄÖµÏÈ»º´æµ½±¾µØ¡£


        2¡¢Client½«usernameµÄÃ÷ÎÄ·¢Ë͸øDC£¨Óò¿Ø£©¡£


        3¡¢DC»áÉú³ÉÒ»¸ö16×Ö½ÚµÄËæ»úÊý£¬Ò²¾ÍÊÇÌôÕ½Â루Challenge£©,È»ºóÔÙ´«»Ø¸øClient¡£


        4¡¢µ±ClientÊÕµ½ÌôÕ½ÂëÒԺ󣬻áÏȸ´ÖÆÒ»·Ý£¬È»ºóºÍ»º´æÖеÄÃÜÂëHashÔÙһͬ»ìºÏHashÒ»´Î£¬»ìºÏºóµÄÖµ³ÆÎªresponse£¬Ö®ºóClientÔÙ½«challenge£¬responseÒÔ¼°usernameÒ»²¢¶¼´«¸øserver¡£


        5¡¢Server¶ËÔÚÊÕµ½client´«¹ýÀ´µÄÕâÈý¸öÖµÒÔºó»á°ÑËüÃǶ¼×ª·¢¸øDC¡£


        6¡¢µ±DC½Óµ½¹ýÀ´µÄÕâÈý¸öÖµµÄÒÔºó,»á¸ù¾Ýusernameµ½Óò¿ØµÄÕ˺ÅÊý¾Ý¿â(ntds.dit)ÀïÃæÕÒµ½¸Ãusername¶ÔÓ¦µÄhash,È»ºó°ÑÕâ¸öhashÄóöÀ´ºÍ´«¹ýÀ´µÄchallengeÖµÔÙ»ìºÏhash¡£


        7¡¢½«»ìºÏºóµÄhashÖµ¸ú´«À´µÄresponse½øÐбȽÏ,ÏàͬÔòÈÏÖ¤³É¹¦,·´Ö®,Ôòʧ°Ü,µ±È»,Èç¹ûÊDZ¾µØµÇ¼,ËùÓÐÑéÖ¤¿Ï¶¨Ò²È«²¿¶¼Ö±½ÓÔÚ±¾µØ½øÐÐÁË¡£

         

        ÔÚWindows2000ÒÔºó£¬Windows»úÆ÷¶¼ÓÃNTLMËã·¨ÔÚ±¾µØ±£´æÓû§µÄÃÜÂ룬ÃÜÂëµÄNTLM¹þÏ£±£´æ


        ÔÚ%SystemRoot%System32configSAMÎļþÖС£Windows²Ù×÷ϵͳÖеÄÃÜÂëÒ»°ãÓÉÁ½²¿·Ö×é³É£ºÒ»²¿·ÖΪLM Hash£¬ÁíÒ»²¿·ÖΪNTLM Hash¡£ÔÚWindowsÖУ¬HashµÄ½á¹¹Í¨³£ÈçÏ£º

        Username£ºRID£ºLM-Hash£ºNT-Hash

         

        ÔÚwindows2000ÒÔºóµÄϵͳÖУ¬µÚÒ»²¿·ÖµÄ LM-hash ¶¼ÊÇ¿ÕÖµ£¬ÒòΪLM-hash¿ÉÒÔºÜÈÝÒ×µÄÆÆ½â£¬ËùÒÔwindows2000Ö®ºóÕâ¸öֵĬÈÏΪ¿Õ£¬ËùÒÔµÚ¶þ²¿·ÖµÄNTLM-hash²ÅÕæÕýÊÇÓû§ÃÜÂëµÄ¹þÏ£Öµ¡£ÔÚÉøÍ¸²âÊÔÖУ¬Í¨³£¿É´ÓWindowsϵͳÖеÄSAMÎļþºÍÓò¿ØÊý¾Ý¿âµÄNTDS.ditÎļþ£¨ÔÚÓò»·¾³ÖУ¬Óû§ÐÅÏ¢´æ´¢ÔÚNTDS.ditÖУ©ÖлñµÃËùÓÐÓû§µÄHash¡£

         

        ʹÓÃPwDump¹¤¾ß»ñÈ¡ÃÜÂëHash


        PwDump7¿ÉÒÔÔÚCMDÏÂÌáÈ¡³öϵͳÖеÄÓû§µÄÃÜÂëhash£¬Ê¹ÓùÜÀíԱȨÏÞÖ±½ÓÔËÐиù¤¾ß¼´¿É£º



        »ñÈ¡µ½Hashºó£¬ÎÒÃÇ¿ÉÒÔÓÃÆÆ½â¹¤¾ßÀ´ÆÆ½âµÃµ½Ã÷ÎÄÃÜÂ룬Ҳ¿ÉÒÔ½øÐйþÏ£´«µÝ¹¥»÷À´ºáÏòÉøÍ¸¡£

         

        ʹÓÃMimikatz¹¤¾ßץȡWindowsÃÜÂë


        MimikatzÊǻƽð³Ç¹ÙÍøÈËÔ±ÔÚÄÚÍøÉøÍ¸¹ý³ÌÖеÄÀûÆ÷£¬ËüÊÇÓÉ·¨¹úµÄһλ´óÉñÑз¢µÄ¡£¹¥»÷Õß¿ÉÒÔͨ¹ýMimikatzÌáÉý½ø³ÌȨÏÞ×¢Èë½ø³Ì¶ÁÈ¡½ø³ÌÄÚ´æ¡£

         

        MimikatzµÄ×î´ó¹¦ÄÜÊÇ¿ÉÒÔÖ±½Ó¶ÁÈ¡Windows²Ù×÷ϵͳµÄÃ÷ÎÄÃÜÂ룬ԭÀíÊÇlsass.exeÊÇWindowsϵͳµÄ»Æ½ð³Ç¹ÙÍø»úÖÆ£¬Ö÷ÒªÓÃÓÚ±¾µØ»Æ½ð³Ç¹ÙÍøºÍµÇ½²ßÂÔ£¬Í¨³£ÔÚÎÒÃǵǽϵͳʱÊäÈëÃÜÂëºó£¬ÃÜÂë±ã»á´æÖüÔÚlsass.exeÄÚ´æÖУ¬¾­¹ýwdigestºÍtspkgÁ½¸öÄ£¿éµ÷Óúó£¬¶ÔÆäʹÓÿÉÄæµÄËã·¨½øÐмÓÃܲ¢´æ´¢ÔÚÄÚ´æÖУ¬¶øMimikatzÕýÊÇͨ¹ý¶Ôlsass.exeÄæËã»ñÈ¡µ½Ã÷ÎÄÃÜÂë¡£

         

        ÐèҪעÒâµÄÊǵ±Ä¿±êΪwin10»ò2012R2ÒÔÉÏʱ£¬Ä¬ÈÏÔÚÄÚ´æÖнûÖ¹±£´æÃ÷ÎÄÃÜÂ룬µ«ÊÇÎÒÃÇ¿ÉÒÔͨ¹ýÐÞ¸Ä×¢²á±íµÄ·½Ê½×¥È¡Ã÷ÎÄ£¬ÊäÈëÒÔÏÂÃüÁî¼´¿É£º


        Reg add HKLMSYSTEMCurrentContro

        lSetControlSecurityProvidersWDigest /vUseLogonCredential /t REG_DWORD /d 1 /f

         

        1¡¢Ö±½Ó¶ÁÈ¡


        Mimikatz¶ÁÈ¡Ã÷ÎÄÃÜÂëºÍhashʱÐèÒª¹ÜÀíԱȨÏÞ¡£

        privilege::debug           //ÌáÉýÖÁdebugȨÏÞ

        sekurlsa::logonpasswords   //ץȡÃÜÂë



        2¡¢Procdump+MimikatzÀëÏß¶ÁÈ¡lsass.dmpÎļþ


        ProcdumpÊÇ΢Èí¹Ù·½·¢²¼µÄ¹¤¾ß£¬¿ÉÒÔÓÃÀ´½«Ä¿±êlsassÎļþµ¼³ö¡£ÏÈÔÚÄ¿±ê»úÆ÷ÉÏÉÏ´«Procdump£¬µ¼³ölsass.dmp

        procdump64.exe-accepteula-ma

        lsass.exe lsass.dmp



        ½«Ä¿±ê»úÉϵÄlsass.dmpÏÂÔØµ½±¾µØºó£¬Ö´ÐÐMimikatzµ¼³ölsass.dmpÀïÃæµÄÃÜÂëºÍhash£º

         

        sekurlsa::minidump Ŀ¼lsass.dmp //½«µ¼³öµÄlsass.dmpÔØÈëµ½MimikatzÖÐ

        sekurlsa::logonpasswords full    //»ñÈ¡ÃÜÂë

         

        3¡¢Í¨¹ýSAMºÍSystemÎļþץȡÃÜÂëºÍHash


        Ê×ÏÈÀûÓÃ×¢²á±íÃüÁĿ±ê»úµÄsam»òÕßsystemÎļþµ¼³ö

        reg save hklmsam sam.hive

        reg save hklmsystem system.hive



        È»ºó½«Ä¿±ê»úÉϵÄsam.hiveºÍsystem.hiveÏÂÔØµ½±¾µØ£¬ÀûÓÃMimikatz¶ÁÈ¡samºÍsystemÎļþ»ñÈ¡NTLMHash£º

         

        token::elevate

        lsadump::sam


         

        WindowsÃÜÂëÆÆ½â·½·¨


        1¡¢ophcrackÔÚÏßÆÆ½â


        ÔÙͨ¹ýÒÔÉϹ¤¾ß»ñÈ¡µ½ÃÜÂëHashºó£¬ÎÒÃÇÐèÒª¶ÔÆä½øÐÐÆÆ½â£¬ÒԵõ½Ã÷ÎÄÃÜÂë¡£OphcrackÍøÕ¾https://www.objectif-securite.ch/en/ophcrackÌṩÁËÔÚÏßHashÆÆ½â·þÎñ£¬ÎÒÃǽ«µÃµ½µÄNTLM HashÊäÈëµ½µÚÒ»¸ö²éѯ¿òÄÚ£¬µã»÷GO¼´¿É½øÐÐÆÆ½â£¬Ð¡ÓÚ14λµÄÃÜÂëÒ»°ãÔÚ¼¸·ÖÖÓÄھͿÉÒÔÆÆ½âÍê³É£º


        2¡¢ophcarck¹¤¾ßÆÆ½â

        OphcrackÊÇÒ»¿îWindowsÃÜÂë¹þÏ£ÖµÆÆ½â¹¤¾ß£¬ÔÚËüµÄ¹ÙÍøÎªÎÒÃÇÌṩÁ˼¸Ê®GBµÄ¹þÏ£±í¡£²Êºç±íÏÂÔØµØÖ·£º
        https://ophcrack.sourceforge.io/tables.php

         

        ·À·¶´ëÊ©


        1¡¢¸üв¹¶¡

        ΢ÈíΪÁË·ÀÖ¹Óû§µÄÃ÷ÎÄÃÜÂëÔÚÄÚ´æÖÐй¶£¬·¢²¼ÁËKB2871997²¹¶¡£¬¹Ø±ÕÁËWdigest¹¦ÄÜ¡£Windows Server 2012¼°ÒÔÉϰ汾ĬÈϹرÕWdigest£¬Ê¹¹¥»÷ÕßÎÞ·¨´ÓÄÚ´æÖлñÈ¡Ã÷ÎÄÃÜÂë¡£Windows Server 2012ÒÔϰ汾£¬Èç¹û°²×°ÁËKB2871997²¹¶¡£¬¹¥»÷ÕßͬÑùÎÞ·¨»ñÈ¡Ã÷ÎÄÃÜÂë¡£ 2¡¢¹Ø±ÕWdigest Auth

        Èç¹ûÎÞ·¨¸üв¹¶¡£¬ÐèÒªÊÖ¶¯¹Ø±ÕWdigest Auth£¬ÔÚCMDÖÐÊäÈëÒÔÏÂÃüÁreg add HKLMSYSTEMCurrentControlSet
        ControlSecurityProvidersWDigest /vUseLogonCredential /t REG_DWORD /d 0 /f  // ¹Ø±ÕWdigest Auth

        ÐèÒª½«UseLogonCredentialµÄÖµÉèΪ0£¬È»ºó×¢Ïúµ±Ç°Óû§£¬ÖØÐµÇ½¼´¿É¡£



        Ãâ·ÑÊÔÓÃ
        ·þÎñÈÈÏß

        ÂíÉÏ×Éѯ

        400-811-3777

        »Øµ½¶¥²¿
        ¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿