当前位置:网站首页>[try to hack] windows system account security
[try to hack] windows system account security
2022-06-30 20:09:00 【Happy star】
Blog home page : Happy star The blog home page of
Series column :Try to Hack
Welcome to focus on the likes collection ️ Leaving a message.
Starting time :2022 year 6 month 30 Japan
The author's level is very limited , If an error is found , Please let me know , thank !
Do not break the law !!! The whole content of this article , All from the Internet , Only as a record of their own learning .
1、 lower than Windows10, Use command lusrmgr.msc
See if there are any new / Suspicious accounts
2、 higher than Windows10, Control panel -> The user account 
3、net user
But the hidden account cannot be viewed
net user A specific user 
Pay special attention to Guest Whether the user has enabled , Because hackers may not add new users but enable Guest user 
net user hacker$ 111111 /add
The user name is $ End with hidden users ,111111 User password . The above command is to add a hidden user 
You can see it's intercepted , Allow the operation directly
net localgroup administrators hacker$ /add
Add hidden users to the administrators group , The hidden user has administrator privileges

You can see our hidden users in the control panel
4、 Is there any way to " Command prompt " and " Computer management " And hide the account
Yes , Through the registry
function ->regedit
HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users\Name
You can see our hidden users 
administrator The items corresponding to the account are "000001F4"
We will hacker$ Export to hacker.reg. At the same time "000003F3" and "000001F4" Term F The key values are exported as user.reg,admin.reg
use " Notepad " open admin.reg, Will the "F" Copy the content after the value , Replace user.reg Medium "F" Value content , Save when done .
net user hacker$ /del
Delete hidden users
take hacker.reg and user.reg Import registry , The hidden user is finished 
We can still use it normally hacker$ This hidden user 
But at this point , Administrators can still delete our hidden users through the registry , How to hide ?
Came to "HKEY_LOCAL_MACHINE\SAM\SAM" It's about , Set up "SAM" Permissions for the item , take "administrators" You can cancel all the permissions you have .

In this way, the administrator cannot delete it
5、D shield
Use D Shield to check the security of the system account 
It's still very effective , The alarm went off immediately
But the discovery cannot be deleted .
How to delete , To be studied
6、 Combined with log analysis
View administrator login time 、 Whether the user name is abnormal
function ->eventvwr.msc
Log Parser
Download address :https://www.microsoft.com/en-us/download/confirmation.aspx?id=24659
Download to by default C:\Program Files (x86)\Log Parser 2.2
1、 Query the event of successful login
All events of successful login
LogParser.exe -i:EVT –o:DATAGRID "SELECT * FROM c:Security.evtx where EventID=4624"
Events that specify the login time range :
LogParser.exe -i:EVT –o:DATAGRID "SELECT * FROM c:Security.evtx where TimeGenerated>'2018-06-19 23:32:11' and TimeGenerated<'2018-06-20 23:34:00' and EventID=4624"
Extract the user name and password of successful login IP:
LogParser.exe -i:EVT –o:DATAGRID "SELECT EXTRACT_TOKEN(Message,13,' ') as EventType,TimeGenerated as LoginTime,EXTRACT_TOKEN(Strings,5,'|') as Username,EXTRACT_TOKEN(Message,38,' ') as Loginip FROM c:Security.evtx where EventID=4624"
2、 Query the event of login failure
All events of login failure :
LogParser.exe -i:EVT –o:DATAGRID "SELECT * FROM c:Security.evtx where EventID=4625"
Extract login failed user names for aggregation statistics :
LogParser.exe -i:EVT "SELECT EXTRACT_TOKEN(Message,13,' ') as EventType,EXTRACT_TOKEN(Message,19,' ') as user,count(EXTRACT_TOKEN(Message,19,' ')) as Times,EXTRACT_TOKEN(Message,39,' ') as Loginip FROM c:Security.evtx where EventID=4625 GROUP BY Message"
3、 System history switch on record :
LogParser.exe -i:EVT –o:DATAGRID "SELECT TimeGenerated,EventID,Message FROM c:System.evtx where EventID=6005 or EventID=6006"
.\LogParser.exe -i:EVT –o:DATAGRID "SELECT EXTRACT_TOKEN(Message,13,' ') as EventType,TimeGenerated as LoginTime,EXTRACT_TOKEN(Strings,5,'|') as Username,EXTRACT_TOKEN(Message,38,' ') as Loginip FROM E:\onedrive\ desktop \11.evtx where EventID=4624"
边栏推荐
- composer
- 派尔特医疗在港交所招股书二次“失效”,上市计划实质性延迟
- 企业中台规划和IT架构微服务转型
- VR全景添加对比功能,让差异化效果展示更直观!
- 十分之坑,tar命令解压文件的时候竟然不能解析英文括号“()”
- 解决arm_release_ver of this libmali is ‘g2p0-01eac0‘,rk_so_ver is ‘4‘,libgl1-mesa-dev不会被安装,存在未满足的依赖关系
- 一文读懂目标检测:R-CNN、Fast R-CNN、Faster R-CNN、YOLO、SSD「建议收藏」
- 【NLP】【TextCNN】 文本分类
- Spark - 一文搞懂 Partitioner
- 8 - 函数
猜你喜欢
Detailed steps for Django to upload excel tables and write data to the database

传输层 使用滑动窗口实现流量控制

如何快速通过PMP考试?

Idle fish is hard to turn over
Django上传excel表格并将数据写入数据库的详细步骤

Cv+deep learning network architecture pytoch recurrence series basenets (backbones) (I)

Summary of operating system interview questions (updated from time to time)

exness:流动性系列-流动性清洗和反转、决策区间

VR全景中特效是如何编辑的?细节功能如何展示?

更智能!AIRIOT加速煤炭行业节能减排升级
随机推荐
新出生的机器狗,打滚1小时后自己掌握走路,吴恩达开山大弟子最新成果
CADD course learning (1) -- basic knowledge of drug design
派尔特医疗在港交所招股书二次“失效”,上市计划实质性延迟
Basic syntax of VB
传输层 使用滑动窗口实现流量控制
Smarter! Airiot accelerates the upgrading of energy conservation and emission reduction in the coal industry
Solution to rollback of MySQL database by mistake deletion
线上线下双结合,VR全景是家具线上转型好方法!
Ten percent of the time, the tar command can't parse the English bracket "()" when decompressing the file
为什么一定要从DevOps走向BizDevOps?
c语言数组截取,C# 字符串按数组截取方法(C/S)
2022 最新 JCR正式发布全球最新影响因子名单(前600名)
【ICCV 2019】特征超分检测:Towards Precise Supervision of Feature Super-Resolution for Small Object Detection
数据智能——DTCC2022!中国数据库技术大会即将开幕
企业中台规划和IT架构微服务转型
GeoServer安装
Idle fish is hard to turn over
RP prototype resource sharing - shopping app
Graduates
How to pass the PMP Exam quickly?