shared information. Do not set the users who share files to the Everyone group at any time. Including print sharing, the default property is "Everyone" group, must not forget to change. 9, cancellation of other unnecessary services please decide for yourself according to your own needs, the following gives the HTTP/FTP server need the least service as a reference: Event Log License Logging Service Windows NTLM Security Support Provider Re
Author: phantom brigade CIELPhantom tour: http://www.ph4nt0m.net/bbs/E-MAIL: 106130@SOHU.COMRecently, SMB session hijacking has become a hot topic. In fact, the documentation on this aspect has long been complete, such as encryption mechanisms and vulnerabilities.This article does not have any technical things, but only helps you understand the specific implementation of the attack process.Let's start with two tools: SMBPROXY and SMBRELAY. Generally, if you get the NTLMHash password of a remote
is from the script RTCs I wrote. It is a script for remotely configuring the telnet service.Here only the key parts are listed:
first, create an object and connect to the server: copy Code the code is as follows: Set objlocator = Createobject (" wbemscripting. swbemlocator ") set objswbemservices = objlocator. connectserver (IPaddress, "Root \ default", username, password)
first, create a service locating object, and then use the connectserver method of the object to connect to the ser
--> advancedAdd WLS② Internet Options --> advanced --> SecurityOK. Windows identity authentication is selected.
After WebLogic of the Service segment receives this token, it must go to the ad for verification.
Integrated with Windows authentication (formerly known as NTLM authentication and Windows NT question/Response Authentication), NTLM or kerbetas authentication can be used.
phenomenon : The site set for the AD integration certification, but when the visit is prompted to enter account password. Three times after the error occurred.
Scenario : Run under C:\Inetpub\Adminscripts: cscript adsutil.vbs set w3svc/ntauthenticationproviders "NTLM" modifies the validation mechanism.
The original text reads as follows:
http://support.microsoft.com/kb/871179
you receive an error message when you try to access a Web site that is par
format. To meet the requirements of 14 bytes, we need to complete the binary 0 of 72bits. After the final completion, the hexadecimal value is 41444d494e0000000000000000000000.
· Divide the above Code (41444d494e0000000000000000000000) into two groups of 7 bytes of data:
41444D494E0000
00000000000000
· Convert the hexadecimal format of each 7-byte group to binary. Add 0 at the end of each 7-bit group. Then, convert the hexadecimal format to get the 8-byte encoding of the two groups:
41444D494E0
| no enables the idle session.
Maxfail = attempts set the number of logon attempts that failed before disconnection.
Maxconn = connections sets the maximum number of connections.
Port = number: Set the Telnet port.
Sec = [+/-] NTLM [+/-] passwd set the authentication authority
Fname = file specifies the audit file name.
Fsize = size specifies the maximum size (MB) of the audit file ).
Mode = console | stream specifies the operation mode
Windows 2000 comes with the TELNET service, but uses the identity authentication mechanism in the NT4 era.
NTLM (nt lan manager ).
I. Original Method
I remember when I talked about using WIN2K TELNET as an intrusion backdoor, it was caused by NTLM verification.
The entire process is very cumbersome. It's time-consuming and laborious. I sorted out the steps.
1. Obtain the password of the Administrator accoun
value timeoutactive = yes | no enables idle sessions. maxfail = attempts set the number of logon attempts that failed before disconnection. maxconn = connections sets the maximum number of connections. port = number: Set the Telnet port. sec = [+/-] NTLM [+ /-] Passwd sets the authentication authority fname = file to specify the audit file name. fsize = size specifies the maximum size (MB) of the audit file ). mode = console | stream specifies the op
AutoShareServer type is REG_DWORD. Change the value to 0.
9. Disable LanManager Authentication
Windows NT Servers Service Pack 4 and later versions both support three different Authentication Methods: LanManager (LM) authentication; Windows NT (also called NTLM) authentication; windows NT Version 2.0 (also called NTLM2) authentication. By default, when a customer attempts to connect a server that supports both LM and
, you can change the default folder name provided by the installer. Without using the well-known paths, attackers can increase the difficulty of deliberate destruction. Because this operation is very simple (at least when you install the server for the first time) and improves security, it can be said that it is the best operation, as long as it is feasible, it should be done.
[Edited by: neomagic on]
----------------------------------------------------Leave a messagePost Operation:Neomagic
Nu
, Windows 2000 Server, Windows XPUsage:Use the script cscript.exe in the command line to call the script, such
C: \> cscript RTCs. VBE
The NTLM value can be 0, 1, 2:0: NTLM authentication is not used;1: First try NTLM authentication. If the password fails, use the user name and password;2: Only NTLM authentication
Yesterday, during the t3n chat, The t3n talked about Windows Credentials Editor v1.2 (WCE), which not only captures HASH, but also injects HASH attacks and promotes them to domain administrator privileges.The parameters are as follows:-L List logon sessions and NTLM credentials (default ).-S Changes NTLM credentials of current logon session.Parameters: -R Lists logon sessions and
Ticket at will?
In fact, as long as you get the domain control permission, you can easily obtain the Hash value of krbtgt. Then, you can use mimikatz to generate a Ticket with any user permissions, that is, Golden Ticket.1. Export the krbtgt Hash
Execute on domain control1 mimikatz log "lsadump: dcsync/domain: test. local/user: krbtgt"
Generate mimikatz. log record output, and use log output to conveniently copy Hash values
:
Find the following information:1 2 3/domain: test. local/sid: S-1-5-2
sent to the recipient ). This krb_tgs_rep is composed of two parts: the session key (sserver-client) used for client and server is encrypted using the logon session key (skdc-client) and ticket encrypted using the master key of the server. The ticket includes the following content:
Session Key: sserver-client.
Client name realm: domain name \ Client.
End Time: The expiration time of ticket.
The client receives krb_tgs_rep and uses the logon session key (skdc-client) to decr
small program: opentelnet.exe, which is available on all major download sites and must meet four requirements:
1) IPC $ sharing is enabled for the target.2) You must have an administrator password and an account.3) The RemoteRegistry service is enabled for the target user and the NTLM authentication is required.4) valid for Win2k/XP, NT not testedCommand Format: opentelnet.exe // server account psw NTLM au
Chapter 1 Securing Your Server and Network (9): use Kerberos for authentication, securingkerberosSource: Workshop
Without the consent of the author, no one shall be published in the form of "original" or used for commercial purposes. I am not responsible for any legal liability.
Previous Article: http://blog.csdn.net/dba_huangzj/article/details/38263043
Preface:
In the Active Directory, two authentication mechanisms are available: NTLM and Kerber
anonymous client.• Basic specifies Basic Authentication for the client.• Digest specifies digest authentication for the client.• NTLM specifies nt lan Manager (NTLM) authentication. It is used when Kerberos Authentication cannot be used for some reason. You can also set the allowntlm attribute to false to disable NTLM from being used for rollback authentication.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.