nmap dump windows hash

简介: While on a penetration test it is sometimes necessary to pull hash files from windows systems to crack weak passwords.

While on a penetration test it is sometimes necessary to pull hash files from windows systems to crack weak passwords. You could easily do this with a Metasploit meterpreter session, but sometimes I like to do it without exploiting the box. Also doing it remotely over the network without a user’s knowledge is always a big plus. This method isn’t always usable and available, but in the right situation we can use an NMAP script called pw-dump.nse to do this. The downside is that it requires an account on the box, and right now it needs to be a Windows Server 2000 or Server 2003 OS to be able to pull the local accounts.

First, we obviously need NMAP installed. For this tutorial I’ll be using Backtrack4-R1, which currently has NMAP 5.35DC1 installed. If you look in the directory /usr/share/nmap/scripts you’ll see all sorts of scripts that do some really helpful things on a test.

What we’re going to use is the one called smb-pwdump.nse. If you don’t have that script you’ll need to download it and put it into the scripts directory. The only place I could find the script was in a slightly older version of NMAP, version 5.00.

 

The next thing you’ll need is the pwdump executable and dll files. Those you can get from here:

wget http://swamp.foofus.net/fizzgig/pwdump/pwdump6-1.7.2-exe-only.tar.bz2

Just extract those into this directory: /usr/share/nmap/nselib/data

Create the directory if the need be. Once you have the script and the executable/dll’s you’re ready to go. To use the script, use the following options changing to match your credentials and target…

# nmap -p 135,139,445 –script=smb-pwdump.nse –script-args=smbuser=administrator,smbpass=lamepassword 192.168.0.190

The output will look similar to this…

The hashes are dumped out in lm:ntlm form and are ready to be cracked in a tool like ophcrack, which I’ll cover in a later post. Remember, this information is only intended for use on systems you own or have permission to use it on.

Information gathered from http://seclists.org/nmap-dev/2009/q1/22

目录
相关文章
|
5月前
|
Java Windows 容器
【应用服务 App Service】快速获取DUMP文件(App Service for Windows(.NET/.NET Core))
【应用服务 App Service】快速获取DUMP文件(App Service for Windows(.NET/.NET Core))
104 4
|
C++ Windows
windows 下C++生成Dump调试文件与分析
windows 下C++生成Dump调试文件与分析
861 0
|
Linux Windows
【调试】Windows夯机Memory Dump案例分析
我们已经看了不少Linux的core dump分析案例了,这次我们来看一个案例,其中利用到了Windows memory dump的分析技巧。Windows的memory dump基本原理几乎和Linux并无太大区别,如果是Crash - 内核崩溃类型的dump,分析思路几乎是完全一致的,当然难度主要在于Windows系统封闭性,即无法提供私有符号和源码,所以多需要一些汇编层面的理解。
3254 0
|
安全 数据库 Windows
Hash injection Attacks in a Windows Network
又是转载的,没啥含量,呵呵。   aka   Why an exposed LM/NTLM Hash is comparable to a clear-text password   aka...
1006 0
|
Windows Unix
Dumping NTLM Hash’s from Windows with Fgdump.
With the release of the new Question-Defense online NTLM, MD5 and MD4 cracker I decide to write...
1029 0
|
Windows
Dump Hash From Windows 2003【转自www.bitsCN.com】
http://www.bitscn.com/hack/safe/200607/47036.html
560 0
|
23天前
|
安全 关系型数据库 MySQL
Windows Server 安装 MySQL 8.0 详细指南
安装 MySQL 需要谨慎,特别注意安全配置和权限管理。根据实际业务需求调整配置,确保数据库的性能和安全。
122 9