- 帖子
- 209
- 积分
- 550
- 威望
- 886
- 金钱
- 697
- 在线时间
- 1 小时
|
[讨论]Radmin提权遇到的问题讨论
信息来源:邪恶八进制信息安全团队(www.eviloctal.com)
议题作者:独孤依人
旁注日一站,支持ASPX,PHP,WS组件没鸟,不过ASPX上传CMD和Net等程序上去后能执行命令,其它的不说了,主要说说Radmin提权吧。
C盘程序目录下发现Radmin,并下载了他的安装文件,得到相关配置信息。
现在就是密码破解了,因为 不了解Radmin的算法,和朋友讨论后也打算放弃,今天刚好看到一位朋友的文章,原文如下:
[原创]小谈RADMIN
转载请保留版权信息!谢谢合作!
by NetPatch
welcome www.nspcn.org and www.icehack.com
最近做渗透测试时常碰到RADMIN一类的东西..
一碰到此类的程序,一般我都会先看下对方把RADMIN的端口配置成什么..以及相应的PASS(加密过的)
HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\Parameters\Parameter //默认密码注册表位置
HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\Parameters\Port //默认端口注册表位置
//把海阳读出来的,用逗号格开,然后用下面的代码转换就可以了
CODE:
[Copy to clipboard]
Dim theStr
theStr = InputBox( "请输入要转换的密码:", "输入", "44,41,43,32,43,5,45,64,43,24,31,53,46,57,64,86" )
If theStr <> "" Then
Call InputBox("请复制已经转换好的密码",,zpass(theStr))
End If
Function zpass(pass)
tpass=""
MyArray = Split(pass, ",", -1, 1)
For each thepass in MyArray
if len(thepass) = 1 then
tpass=tpass+"0"
end if
tpass=tpass+hex(thepass)
Next
zpass=tpass
End Function
//转换后的,就可以拿爆破工具去跑了....
端口读出后类似这样 223,34,0,0
//用下面代码转换即可
CODE:
[Copy to clipboard]
Dim theStr
theStr = InputBox( "请输入要转换的端口:", "输入", "223,34,0,0," )
da = Split(thestr, ",", -1, 1)
If theStr <> "" Then
Call InputBox("请复制已经转换好的端口",,Hex2Dec(Dec2Hex(da(3))&Dec2Hex(da(2))&Dec2Hex(da(1))&Dec2Hex(da(0))))
End If
Function Hex2Dec(Hex)
Hex = UCase(Hex)
For i = 1 To Len(Hex)
Select Case Mid(Hex, Len(Hex) - i + 1, 1)
Case "0": B = B + 16 ^ (i - 1) * 0
Case "1": B = B + 16 ^ (i - 1) * 1
Case "2": B = B + 16 ^ (i - 1) * 2
Case "3": B = B + 16 ^ (i - 1) * 3
Case "4": B = B + 16 ^ (i - 1) * 4
Case "5": B = B + 16 ^ (i - 1) * 5
Case "6": B = B + 16 ^ (i - 1) * 6
Case "7": B = B + 16 ^ (i - 1) * 7
Case "8": B = B + 16 ^ (i - 1) * 8
Case "9": B = B + 16 ^ (i - 1) * 9
Case "A": B = B + 16 ^ (i - 1) * 10
Case "B": B = B + 16 ^ (i - 1) * 11
Case "C": B = B + 16 ^ (i - 1) * 12
Case "D": B = B + 16 ^ (i - 1) * 13
Case "E": B = B + 16 ^ (i - 1) * 14
Case "F": B = B + 16 ^ (i - 1) * 15
End Select
Next
Hex2Dec = B
End Function
Function Dec2Hex(Dec)
Dec2Hex = ""
Do While Dec > 0
a = CStr(Dec Mod 16)
Select Case a
Case "10": a = "A"
Case "11": a = "B"
Case "12": a = "C"
Case "13": a = "D"
Case "14": a = "E"
Case "15": a = "F"
End Select
Dec2Hex = a & Dec2Hex
Dec = Dec \ 16
Loop
End Function
于是立马测试,但苦于不知道Radmin的算法,所以转换后也不知道怎么去暴破。
问题1:Radmin的加密算法
问题2:对于Radmin的提权还有没有更进一步的思路
附:导注册表行不通,权限不够。
最近附上我的这个Reg文件信息,如果哪 位朋友暴破出来了,万分感谢。端口就不能暴破了,已经试出。
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\RAdmin]
[HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0]
[HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server]
[HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\iplist]
[HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\NtUsers]
"1"=hex:24,00,00,00,00,00,00,00,1f,00,00,00,01,05,00,00,00,00,00,05,15,00,00,\
00,99,c8,3d,4a,e9,e2,9b,3a,e1,64,8a,f8,f1,03,00,00,24,00,00,00,00,00,00,00,\
1f,00,00,00,01,05,00,00,00,00,00,05,15,00,00,00,99,c8,3d,4a,e9,e2,9b,3a,e1,\
64,8a,f8,ec,03,00,00,24,00,00,00,00,00,00,00,1f,00,00,00,01,05,00,00,00,00,\
00,05,15,00,00,00,99,c8,3d,4a,e9,e2,9b,3a,e1,64,8a,f8,f4,01,00,00
[HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\Parameters]
"NTAuthEnabled"=hex:00,00,00,00
"Port"=hex:fe,ff,00,00
"Timeout"=hex:0a,00,00,00
"EnableLogFile"=hex:01,00,00,00
"LogFilePath"="c:\\logfile.txt"
"FilterIp"=hex:00,00,00,00
"DisableTrayIcon"=hex:00,00,00,00
"AutoAllow"=hex:00,00,00,00
"AskUser"=hex:00,00,00,00
"EnableEventLog"=hex:01,00,00,00
"Parameter"=hex:b3,8f,17,d7,f9,4e,cb,96,11,26,42,bf,29,cd,a6,86脚本安全小组:Www.Cnsst.Org MSN:cn557@hotmail.com 我们这帮兄弟,永远的兄弟——We are not the only ones,but we will try to be the best!——All In Script 脚本渗透自用利器开发中……
帖子298 精华12 积分3962 阅读权限100 性别男 在线时间901 小时 注册时间2006-4-22 最后登录2008-7-18 查看详细资料引用 报告 回复 TOP 您知道您年薪应是多少?
neokee
荣誉会员
|
|