Windows Credentials Editor v1.2 (WCE)在***过程当中的关键做用

 

昨天G0t3n聊天,G0t3n提及Windows Credentials Editor v1.2 (WCE)这款软件,除了抓HASH,还能注入HASH***,提高为域管理员权限。服务器

参数以下:
        -l              List logon sessions and NTLM credentials (default).
        -s              Changes NTLM credentials of current logon session.
                        Parameters: <UserName>:<DomainName>:<LMHash>:<NTHash>.
        -r              Lists logon sessions and NTLM credentials indefinitely.
                        Refreshes every 5 seconds if new sessions are found.
                        Optional: -r<refresh interval>.
        -c              Run <cmd> in a new session with the specified NTLM credentials.
                        Parameters: <cmd>.
        -e              Lists logon sessions NTLM credentials indefinitely.
                        Refreshes every time a logon event occurs.
        -o              saves all output to a file.
                        Parameters: <filename>.
        -i              Specify LUID instead of use current logon session.
                        Parameters: <luid>.
        -d              Delete NTLM credentials from logon session.
                        Parameters: <luid>.
        -v              verbose output.session

立刻测试一下,登录服务器,下载WCE,而后执行命令:wce -l 列出曾经登录过的用户HASHide

这里说明一下,图中每一个用户名:号和HASH:号之间的就是域或计算机名,图里的域名称是:BIGTH。计算机名是:BKKWEB01,显示的就是此台计算机名
BKKWEB01对应的用户是本地用户不具有域权限。BIGTH是域用户,能够登录域内任何主机。工具

得到了域用户的HASH,就用工具配合彩虹表破解,1分钟左右,密码就出来了。登录域控主机,使用FTP把WCE软件传过来测试

而后再 WCE -l 一下,此次可把域控管理员的HASH也拿到了。ui

 

 仓促写的,错漏请多包涵。。。blog

相关文章
相关标签/搜索