渗透测试之提权:利用抓包嗅探等提权
一、抓包嗅探
1、Windows
• Wireshark
• Omnipeek
- 下载(官网):https://www.liveaction.com/
- OmniPeek_UserGuide:https://mypeek.liveaction.com/elements/mypeek_documentation/manuals/OmniPeek_UserGuide.pdf
• commview(早期XP上主要在用)
• Sniffpass
- 下载:https://www.nirsoft.net/toolsdownload/sniffpass.zip
- Kali安装ftp:https://www.cnblogs.com/z9m8r8/articles/15864297.html
- 开启ftp服务:service pure-ftpd start
2、Linux
• Tcpdump
• Wireshark
• Dsniff
- 和Sniffpass差不多,可以自己安装:apt-get install dsniff
示例:
root@kali:~# dsniff -h Version: 2.4 Usage: dsniff [-cdmn] [-i interface | -p pcapfile] [-s snaplen] [-f services] [-t trigger[,...]] [-r|-w savefile] [expression] root@kali:~# dsniff -i eth0 dsniff: listening on eth0 ----------------- 02/14/22 01:17:19 tcp 10.10.10.131.1071 -> kali.21 (ftp) USER anonymous PASS IEUser@ ----------------- 02/14/22 01:17:25 tcp 10.10.10.131.1072 -> kali.21 (ftp) USER anonymous PASS IEUser@ ----------------- 02/14/22 01:18:55 tcp 10.10.10.131.1074 -> kali.21 (ftp) USER user PASS 123456
二、键盘记录
1、Keylogger
参见:https://www.cnblogs.com/z9m8r8/articles/15864297.html
2、木马窃取
示例(以DarkComet-RAT-5.3.1为例)
如remote desktop:
三、本地缓存密码
1、浏览器缓存的密码
• IE浏览器
• Firefox(Exdit->Prefence)
示例:
2、网络密码
3、无线密码
4、密码还原工具
工具集: https://www.nirsoft.net/password_recovery_tools.html
5、Dump SAM
• Pwdump(可远程执行,通过参数指定相应IP,username等即可)
• /usr/share/windows-binaries/fgdump/
help:
C:\>PwDump.exe -h pwdump6 Version 2.0.0-beta-2 by fizzgig and the mighty group at foofus.net ** THIS IS A BETA VERSION! YOU HAVE BEEN WARNED. ** Copyright 2009 foofus.net This program is free software under the GNU General Public License Version 2 (GNU GPL), you can redistribute it and/or modify it under the terms of the GNU GPL, as published by the Free Software Foundation. NO WARRANTY, EXPRESSED OR IMPLIED, IS GRANTED WITH THISPROGRAM. Please see the COPYING file included with this program and the GNU GPL for further details. Usage: PwDump.exe [-x][-n][-h][-o output_file][-u user][-p password][-s share] machineName where -h prints this usage message and exits where -o specifies a file to which to write the output where -u specifies the user name used to connect to the target where -p specifies the password used to connect to the target where -s specifies the share to be used on the target, rather than searching for one where -n skips password histories where -x targets a 64-bit host
示例:
Windows下password加密方式为LM-Hash(如:44EF……4EE)与NTLM-Hash(如:32ED……8D4),LM,NTML,NET-NTLM2理解及hash破解:https://www.cnblogs.com/junsec/p/11810703.html
将用户名,密文复制下来,单独存个.pwdump文件,利用Kali中的解密工具解密。
不忘初心,方得始终。
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· Linux系列:如何用 C#调用 C方法造成内存泄露
· AI与.NET技术实操系列(二):开始使用ML.NET
· 记一次.NET内存居高不下排查解决与启示
· 探究高空视频全景AR技术的实现原理
· 理解Rust引用及其生命周期标识(上)
· DeepSeek 开源周回顾「GitHub 热点速览」
· 物流快递公司核心技术能力-地址解析分单基础技术分享
· .NET 10首个预览版发布:重大改进与新特性概览!
· AI与.NET技术实操系列(二):开始使用ML.NET
· 单线程的Redis速度为什么快?