ÔÚÄÚÍøÉøÍ¸ÖУ¬µ±¹¥»÷Õß»ñÈ¡µ½ÄÚÍøÄ³Ì¨»úÆ÷µÄ¿ØÖÆÈ¨ºó£¬»áÒé±»¹¥ÏݵÄÖ÷»úÎªÌø°å£¬Í¨¹ýÊÕ¼¯ÓòÄÚÆ¾Ö¤µÈ¸÷ÖÖ·½·¨£¬·ÃÎÊÓòÄÚÆäËû»úÆ÷£¬½øÒ»²½À©´ó×ʲú·¶Î§¡£Í¨¹ý´ËÀàÊֶΣ¬¹¥»÷Õß×îÖÕ¿ÉÄÜ»ñµÃÓò¿ØÖÆÆ÷µÄ·ÃÎÊȨÏÞ£¬ÉõÖÁÍêÈ«¿ØÖÆ»ùÓÚWindows²Ù×÷ϵͳµÄÕû¸öÄÚÍø»·¾³£¬¿ØÖÆÓû»·¾³ÏµÄÈ«²¿»úÆ÷¡£
WindowsÏ»ƽð³Ç¹ÙÍøÈÏÖ¤»úÖÆ
WindowsϵĻƽð³Ç¹ÙÍøÈÏÖ¤»úÖÆ×ܹ²ÓÐÁ½ÖÖ£¬Ò»ÖÖÊÇ»ùÓÚNTLMµÄÈÏÖ¤·½Ê½£¬Ö÷ÒªÓÃÔÚÔçÆÚµÄWindows¹¤×÷×é»·¾³ÖУ»ÁíÒ»ÖÖÊÇ»ùÓÚKerberosµÄÈÏÖ¤·½Ê½£¬Ö÷ÒªÓÃÔÚÓò»·¾³ÖС£
NTLMÈÏÖ¤Á÷³Ìͼ
ÕâÀïÖ÷Òª¶ÔNTLMµÄÈÏÖ¤Á÷³Ì×öÒ»ÏÂ˵Ã÷£º
1¡¢Ê×ÏÈÔÚ¿Í»§¶ËÖÐÊäÈëusername£¬passwordºÍdomain£¬È»ºó¿Í»§¶Ë»á°ÑÃÜÂë½øÐÐHashºóµÄÖµÏÈ»º´æµ½±¾µØ¡£
2¡¢Client½«usernameµÄÃ÷ÎÄ·¢Ë͸øDC£¨Óò¿Ø£©¡£
3¡¢DC»áÉú³ÉÒ»¸ö16×Ö½ÚµÄËæ»úÊý£¬Ò²¾ÍÊÇÌôÕ½Â루Challenge£©,È»ºóÔÙ´«»Ø¸øClient¡£
4¡¢µ±ClientÊÕµ½ÌôÕ½ÂëÒԺ󣬻áÏȸ´ÖÆÒ»·Ý£¬È»ºóºÍ»º´æÖеÄÃÜÂëHashÔÙһͬ»ìºÏHashÒ»´Î£¬»ìºÏºóµÄÖµ³ÆÎªresponse£¬Ö®ºóClientÔÙ½«challenge£¬responseÒÔ¼°usernameÒ»²¢¶¼´«¸øserver¡£
5¡¢Server¶ËÔÚÊÕµ½client´«¹ýÀ´µÄÕâÈý¸öÖµÒÔºó»á°ÑËüÃǶ¼×ª·¢¸øDC¡£
6¡¢µ±DC½Óµ½¹ýÀ´µÄÕâÈý¸öÖµµÄÒÔºó,»á¸ù¾Ýusernameµ½Óò¿ØµÄÕ˺ÅÊý¾Ý¿â(ntds.dit)ÀïÃæÕÒµ½¸Ãusername¶ÔÓ¦µÄhash,È»ºó°ÑÕâ¸öhashÄóöÀ´ºÍ´«¹ýÀ´µÄchallengeÖµÔÙ»ìºÏhash¡£
7¡¢½«»ìºÏºóµÄhashÖµ¸ú´«À´µÄresponse½øÐбȽÏ,ÏàͬÔòÈÏÖ¤³É¹¦,·´Ö®,Ôòʧ°Ü,µ±È»,Èç¹ûÊDZ¾µØµÇ¼,ËùÓÐÑéÖ¤¿Ï¶¨Ò²È«²¿¶¼Ö±½ÓÔÚ±¾µØ½øÐÐÁË¡£
ÔÚWindows2000ÒÔºó£¬Windows»úÆ÷¶¼ÓÃNTLMËã·¨ÔÚ±¾µØ±£´æÓû§µÄÃÜÂ룬ÃÜÂëµÄNTLM¹þÏ£±£´æ
ÔÚ%SystemRoot%System32configSAMÎļþÖС£Windows²Ù×÷ϵͳÖеÄÃÜÂëÒ»°ãÓÉÁ½²¿·Ö×é³É£ºÒ»²¿·ÖΪLM Hash£¬ÁíÒ»²¿·ÖΪNTLM Hash¡£ÔÚWindowsÖУ¬HashµÄ½á¹¹Í¨³£ÈçÏ£º
Username£ºRID£ºLM-Hash£ºNT-Hash
ÔÚwindows2000ÒÔºóµÄϵͳÖУ¬µÚÒ»²¿·ÖµÄ LM-hash ¶¼ÊÇ¿ÕÖµ£¬ÒòΪLM-hash¿ÉÒÔºÜÈÝÒ×µÄÆÆ½â£¬ËùÒÔwindows2000Ö®ºóÕâ¸öֵĬÈÏΪ¿Õ£¬ËùÒÔµÚ¶þ²¿·ÖµÄNTLM-hash²ÅÕæÕýÊÇÓû§ÃÜÂëµÄ¹þÏ£Öµ¡£ÔÚÉøÍ¸²âÊÔÖУ¬Í¨³£¿É´ÓWindowsϵͳÖеÄSAMÎļþºÍÓò¿ØÊý¾Ý¿âµÄNTDS.ditÎļþ£¨ÔÚÓò»·¾³ÖУ¬Óû§ÐÅÏ¢´æ´¢ÔÚNTDS.ditÖУ©ÖлñµÃËùÓÐÓû§µÄHash¡£
ʹÓÃPwDump¹¤¾ß»ñÈ¡ÃÜÂëHash
PwDump7¿ÉÒÔÔÚCMDÏÂÌáÈ¡³öϵͳÖеÄÓû§µÄÃÜÂëhash£¬Ê¹ÓùÜÀíԱȨÏÞÖ±½ÓÔËÐиù¤¾ß¼´¿É£º
»ñÈ¡µ½Hashºó£¬ÎÒÃÇ¿ÉÒÔÓÃÆÆ½â¹¤¾ßÀ´ÆÆ½âµÃµ½Ã÷ÎÄÃÜÂ룬Ҳ¿ÉÒÔ½øÐйþÏ£´«µÝ¹¥»÷À´ºáÏòÉøÍ¸¡£
ʹÓÃMimikatz¹¤¾ßץȡWindowsÃÜÂë
MimikatzÊǻƽð³Ç¹ÙÍøÈËÔ±ÔÚÄÚÍøÉøÍ¸¹ý³ÌÖеÄÀûÆ÷£¬ËüÊÇÓÉ·¨¹úµÄһλ´óÉñÑз¢µÄ¡£¹¥»÷Õß¿ÉÒÔͨ¹ýMimikatzÌáÉý½ø³ÌȨÏÞ×¢Èë½ø³Ì¶ÁÈ¡½ø³ÌÄÚ´æ¡£
MimikatzµÄ×î´ó¹¦ÄÜÊÇ¿ÉÒÔÖ±½Ó¶ÁÈ¡Windows²Ù×÷ϵͳµÄÃ÷ÎÄÃÜÂ룬ÔÀíÊÇlsass.exeÊÇWindowsϵͳµÄ»Æ½ð³Ç¹ÙÍø»úÖÆ£¬Ö÷ÒªÓÃÓÚ±¾µØ»Æ½ð³Ç¹ÙÍøºÍµÇ½²ßÂÔ£¬Í¨³£ÔÚÎÒÃǵǽϵͳʱÊäÈëÃÜÂëºó£¬ÃÜÂë±ã»á´æÖüÔÚlsass.exeÄÚ´æÖУ¬¾¹ýwdigestºÍtspkgÁ½¸öÄ£¿éµ÷ÓÃºó£¬¶ÔÆäʹÓÿÉÄæµÄËã·¨½øÐмÓÃܲ¢´æ´¢ÔÚÄÚ´æÖУ¬¶øMimikatzÕýÊÇͨ¹ý¶Ôlsass.exeÄæËã»ñÈ¡µ½Ã÷ÎÄÃÜÂë¡£
ÐèҪעÒâµÄÊǵ±Ä¿±êΪwin10»ò2012R2ÒÔÉÏʱ£¬Ä¬ÈÏÔÚÄÚ´æÖнûÖ¹±£´æÃ÷ÎÄÃÜÂ룬µ«ÊÇÎÒÃÇ¿ÉÒÔͨ¹ýÐÞ¸Ä×¢²á±íµÄ·½Ê½×¥È¡Ã÷ÎÄ£¬ÊäÈëÒÔÏÂÃüÁî¼´¿É£º
Reg add HKLMSYSTEMCurrentContro
lSetControlSecurityProvidersWDigest /vUseLogonCredential /t REG_DWORD /d 1 /f
1¡¢Ö±½Ó¶ÁÈ¡
Mimikatz¶ÁÈ¡Ã÷ÎÄÃÜÂëºÍhashʱÐèÒª¹ÜÀíԱȨÏÞ¡£
privilege::debug //ÌáÉýÖÁdebugȨÏÞ
sekurlsa::logonpasswords //ץȡÃÜÂë
2¡¢Procdump+MimikatzÀëÏß¶ÁÈ¡lsass.dmpÎļþ
ProcdumpÊÇ΢Èí¹Ù·½·¢²¼µÄ¹¤¾ß£¬¿ÉÒÔÓÃÀ´½«Ä¿±êlsassÎļþµ¼³ö¡£ÏÈÔÚÄ¿±ê»úÆ÷ÉÏÉÏ´«Procdump£¬µ¼³ölsass.dmp
procdump64.exe-accepteula-ma
lsass.exe lsass.dmp

½«Ä¿±ê»úÉϵÄlsass.dmpÏÂÔØµ½±¾µØºó£¬Ö´ÐÐMimikatzµ¼³ölsass.dmpÀïÃæµÄÃÜÂëºÍhash£º
sekurlsa::minidump Ŀ¼lsass.dmp //½«µ¼³öµÄlsass.dmpÔØÈëµ½MimikatzÖÐ
sekurlsa::logonpasswords full //»ñÈ¡ÃÜÂë
3¡¢Í¨¹ýSAMºÍSystemÎļþץȡÃÜÂëºÍHash
Ê×ÏÈÀûÓÃ×¢²á±íÃüÁĿ±ê»úµÄsam»òÕßsystemÎļþµ¼³ö
reg save hklmsam sam.hive
reg save hklmsystem system.hive
È»ºó½«Ä¿±ê»úÉϵÄsam.hiveºÍsystem.hiveÏÂÔØµ½±¾µØ£¬ÀûÓÃMimikatz¶ÁÈ¡samºÍsystemÎļþ»ñÈ¡NTLMHash£º
token::elevate
lsadump::sam

WindowsÃÜÂëÆÆ½â·½·¨
1¡¢ophcrackÔÚÏßÆÆ½â
ÔÙͨ¹ýÒÔÉϹ¤¾ß»ñÈ¡µ½ÃÜÂëHashºó£¬ÎÒÃÇÐèÒª¶ÔÆä½øÐÐÆÆ½â£¬ÒԵõ½Ã÷ÎÄÃÜÂë¡£OphcrackÍøÕ¾https://www.objectif-securite.ch/en/ophcrackÌṩÁËÔÚÏßHashÆÆ½â·þÎñ£¬ÎÒÃǽ«µÃµ½µÄNTLM HashÊäÈëµ½µÚÒ»¸ö²éѯ¿òÄÚ£¬µã»÷GO¼´¿É½øÐÐÆÆ½â£¬Ð¡ÓÚ14λµÄÃÜÂëÒ»°ãÔÚ¼¸·ÖÖÓÄھͿÉÒÔÆÆ½âÍê³É£º
2¡¢ophcarck¹¤¾ßÆÆ½â
OphcrackÊÇÒ»¿îWindowsÃÜÂë¹þÏ£ÖµÆÆ½â¹¤¾ß£¬ÔÚËüµÄ¹ÙÍøÎªÎÒÃÇÌṩÁ˼¸Ê®GBµÄ¹þÏ£±í¡£²Êºç±íÏÂÔØµØÖ·£º
https://ophcrack.sourceforge.io/tables.php
·À·¶´ëÊ©
1¡¢¸üв¹¶¡
΢ÈíΪÁË·ÀÖ¹Óû§µÄÃ÷ÎÄÃÜÂëÔÚÄÚ´æÖÐй¶£¬·¢²¼ÁËKB2871997²¹¶¡£¬¹Ø±ÕÁËWdigest¹¦ÄÜ¡£Windows Server 2012¼°ÒÔÉϰ汾ĬÈϹرÕWdigest£¬Ê¹¹¥»÷ÕßÎÞ·¨´ÓÄÚ´æÖлñÈ¡Ã÷ÎÄÃÜÂë¡£Windows Server 2012ÒÔϰ汾£¬Èç¹û°²×°ÁËKB2871997²¹¶¡£¬¹¥»÷ÕßͬÑùÎÞ·¨»ñÈ¡Ã÷ÎÄÃÜÂë¡£ 2¡¢¹Ø±ÕWdigest Auth
Èç¹ûÎÞ·¨¸üв¹¶¡£¬ÐèÒªÊÖ¶¯¹Ø±ÕWdigest Auth£¬ÔÚCMDÖÐÊäÈëÒÔÏÂÃüÁreg add HKLMSYSTEMCurrentControlSet
ControlSecurityProvidersWDigest /vUseLogonCredential /t REG_DWORD /d 0 /f // ¹Ø±ÕWdigest Auth
ÐèÒª½«UseLogonCredentialµÄÖµÉèΪ0£¬È»ºó×¢Ïúµ±Ç°Óû§£¬ÖØÐµÇ½¼´¿É¡£