Windows Credentials Editor v1.2 (WCE)在***過程當中的關鍵做用

 

昨天G0t3n聊天,G0t3n提及Windows Credentials Editor v1.2 (WCE)這款軟件,除了抓HASH,還能注入HASH***,提高爲域管理員權限。服務器

參數以下:
        -l              List logon sessions and NTLM credentials (default).
        -s              Changes NTLM credentials of current logon session.
                        Parameters: <UserName>:<DomainName>:<LMHash>:<NTHash>.
        -r              Lists logon sessions and NTLM credentials indefinitely.
                        Refreshes every 5 seconds if new sessions are found.
                        Optional: -r<refresh interval>.
        -c              Run <cmd> in a new session with the specified NTLM credentials.
                        Parameters: <cmd>.
        -e              Lists logon sessions NTLM credentials indefinitely.
                        Refreshes every time a logon event occurs.
        -o              saves all output to a file.
                        Parameters: <filename>.
        -i              Specify LUID instead of use current logon session.
                        Parameters: <luid>.
        -d              Delete NTLM credentials from logon session.
                        Parameters: <luid>.
        -v              verbose output.session

立刻測試一下,登錄服務器,下載WCE,而後執行命令:wce -l 列出曾經登錄過的用戶HASHide

這裏說明一下,圖中每一個用戶名:號和HASH:號之間的就是域或計算機名,圖裏的域名稱是:BIGTH。計算機名是:BKKWEB01,顯示的就是此臺計算機名
BKKWEB01對應的用戶是本地用戶不具有域權限。BIGTH是域用戶,能夠登錄域內任何主機。工具

得到了域用戶的HASH,就用工具配合彩虹表破解,1分鐘左右,密碼就出來了。登錄域控主機,使用FTP把WCE軟件傳過來測試

而後再 WCE -l 一下,此次可把域控管理員的HASH也拿到了。ui

 

 倉促寫的,錯漏請多包涵。。。blog

相關文章
相關標籤/搜索