找回密码
 立即注册
企业管理 2022-09-18 95 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
法国佬写的神器mimikatz直接从lsass.exe里获取windows处于active状况账号明文密码的文章密码复杂度在14位以上包括数字大小写字母特别字符的密码相同能抓出明文密码来然后这个神器的功能必定不仅仅如此在我看来它更像一个轻量级调试器可以提高进程权限注入进程读取进程内存等等总之这个神器适当华丽还有更多才能有待各黑阔们发掘=..=~教程见:/viewthread.php?tid=916596pid=4717477page=1extra=#pid4717477注意,注意,注意,本程序可能会被杀毒软件当黑阔程序给杀掉或禁止。
tools\lisezmoi.txt
tools\PsExec.exe
tools\tee.exe
tools\winmine.exe
Win32\kappfree.dll
Win32\kelloworld.dll
Win32\KiwiCmd.exe
Win32\KiwiRegedit.exe
Win32\KiwiTaskmgr.exe
Win32\klock.dll
Win32\mimikatz.exe
Win32\mimikatz.sys
Win32\sekurlsa.dll
x64\kappfree.dll
x64\kelloworld.dll
x64\KiwiCmd.exe
x64\KiwiRegedit.exe
x64\KiwiTaskmgr.exe
x64\klock.dll
x64\mimikatz.exe
x64\mimikatz.sys
x64\sekurlsa.dll
.....

(The artifact mimikatz written by the Frenchman directly obtains the plaintext password of the account in the active state from lsass.exe. The password complexity is more than 14 digits, including numbers, uppercase and lowercase letters and special characters. It must be more than that. In my opinion, it is more like a lightweight debugger, which can increase process permissions, inject process into process, read process memory, etc. In short, this artifact is appropriate and gorgeous, and there are more to be discovered by all blacks =..=~ For the tutorial, see: /viewthread.php?tid=916596pid=4717477page=1extra=#pid4717477 Attention, attention, attention, this program may be killed or banned by anti-virus software as a black program.
tools\lisezmoi.txt
tools\PsExec.exe
tools\tee.exe
tools\winmine.exe
Win32\kappfree.dll
Win32\kelloworld.dll
Win32\KiwiCmd.exe
Win32\KiwiRegedit.exe
Win32\KiwiTaskmgr.exe
Win32\klock.dll
Win32\mimikatz.exe
Win32\mimikatz.sys
Win32\sekurlsa.dll
x64\kappfree.dll
x64\kelloworld.dll
x64\KiwiCmd.exe
x64\KiwiRegedit.exe
x64\KiwiTaskmgr.exe
x64\klock.dll
x64\mimikatz.exe
x64\mimikatz.sys
x64\sekurlsa.dll
.....)

[下载]15363886450.rar




上一篇:H3C SecPath操作手册
下一篇:天融信防火墙配置