mimikatz_trunk直接抓取Windows 明文密码
法国佬写的神器mimikatz直接从lsass.exe里获取windows处于active状况账号明文密码的文章密码复杂度在14位以上包括数字大小写字母特别字符的密码相同能抓出明文密码来然后这个神器的功能必定不仅仅如此在我看来它更像一个轻量级调试器可以提高进程权限注入进程读取进程内存等等总之这个神器适当华丽还有更多才能有待各黑阔们发掘=..=~教程见:/viewthread.php?tid=916596pid=4717477page=1extra=#pid4717477注意,注意,注意,本程序可能会被杀毒软件当黑阔程序给杀掉或禁止。tools\lisezmoi.txt
tools\PsExec.exe
tools\tee.exe
tools\winmine.exe
Win32\kappfree.dll
Win32\kelloworld.dll
Win32\KiwiCmd.exe
Win32\KiwiRegedit.exe
Win32\KiwiTaskmgr.exe
Win32\klock.dll
Win32\mimikatz.exe
Win32\mimikatz.sys
Win32\sekurlsa.dll
x64\kappfree.dll
x64\kelloworld.dll
x64\KiwiCmd.exe
x64\KiwiRegedit.exe
x64\KiwiTaskmgr.exe
x64\klock.dll
x64\mimikatz.exe
x64\mimikatz.sys
x64\sekurlsa.dll
.....
(The artifact mimikatz written by the Frenchman directly obtains the plaintext password of the account in the active state from lsass.exe. The password complexity is more than 14 digits, including numbers, uppercase and lowercase letters and special characters. It must be more than that. In my opinion, it is more like a lightweight debugger, which can increase process permissions, inject process into process, read process memory, etc. In short, this artifact is appropriate and gorgeous, and there are more to be discovered by all blacks =..=~ For the tutorial, see: /viewthread.php?tid=916596pid=4717477page=1extra=#pid4717477 Attention, attention, attention, this program may be killed or banned by anti-virus software as a black program.
tools\lisezmoi.txt
tools\PsExec.exe
tools\tee.exe
tools\winmine.exe
Win32\kappfree.dll
Win32\kelloworld.dll
Win32\KiwiCmd.exe
Win32\KiwiRegedit.exe
Win32\KiwiTaskmgr.exe
Win32\klock.dll
Win32\mimikatz.exe
Win32\mimikatz.sys
Win32\sekurlsa.dll
x64\kappfree.dll
x64\kelloworld.dll
x64\KiwiCmd.exe
x64\KiwiRegedit.exe
x64\KiwiTaskmgr.exe
x64\klock.dll
x64\mimikatz.exe
x64\mimikatz.sys
x64\sekurlsa.dll
.....)
页:
[1]