当前位置:网站首页>Network security - penetration using evil maid physical access security vulnerabilities
Network security - penetration using evil maid physical access security vulnerabilities
2022-07-24 13:41:00 【Beluga】
Use Evil Maid Penetration of physical access security vulnerabilities
First step , Open the network topology , Start the experimental virtual machine , View the virtual machines separately IP Address :
Windows 2012-2

Windows 2012-1

The second step , Enter the infiltration machine Windows 2012-2, Click the first icon on the right of the start menu to enter the server manager , Click the icon of the flag to configure after deployment , Choose to promote this server to a domain controller

In deployment configuration , Select Add New Forest (F), And fill in the root domain name of the forged domain server , The root domain name depends on the host in the domain Windows 2012-1 Fill in the fields shown in pyseclabs.com


And then click next , Enter the domain controller option and fill in the directory service restore mode password [email protected]

Next DNS Options directly select next

Other options go directly to the next step


Click next to enter the prerequisite check , Choose next

Choose to install

Click restart server after installation .

The third step , Switch to Windows 2012-1, Simulate the normal login of users , Get into CMD The command line uses commands ipconfig -all | findstr DNS

During the routine penetration test , Penetration testers should do a good job in domain name deception or resolution in advance , Make the address of the victim's host resolution server point to the forged server address , For the convenience of observing the experimental effect, the analytical steps are omitted here , Directly set the domain user configuration DNS The address is 172.16.1.100, Use command shutdown -l Unregister domain host

Step four , Enter the infiltration machine Windows 2012-2(ROGUEDC) Modify user name in administrator Password , And set that this user must change the password for the next login .
Click on the left dashboard AD DS, Right click the server name ROGUEDC The host , find Active Directory Users and computers

Click , Find the user Administrator, Right click to select reset password

Fill in the password ZkPy2020..666( Be careful ZP All in capitals ), Check that the user must change his password when logging in next time

Tips Administrator Your password has been changed

Step five , Switch to the target login interface , Click on PYSECLABS\Administrator, Type the modified user name and password (Administrator\ZkPy2020..666)

Prompt before login , The user's password must be changed ,

For administrator users Administrator Change your password

Prompt that your password has been changed , Explain the administrator user Administrator Your password has been modified successfully

Step six , Switch to the forged domain server , Click in the lower right corner to open the network and Sharing Center

Select change adapter settings

Right click Ethernet , Select disable

Step seven , Switch to the target login interface , Log in again with the modified user name and password , Wait patiently , It may take a long time to enter the desktop

After entering the system, use CMD command whoami Check whether the current user permission is Administrator

边栏推荐
- 网络安全——Cookie注入
- How can the easycvr platform access special devices without authentication?
- Packaging class (mutual conversion between types)
- hdparm
- Basic operation of file
- 基于群体熵的机器人群体智能汇聚度量
- An error is reported when using activiti to create a database table,
- 网络安全——Web渗透测试
- 网络安全——报错注入
- Error reported when using activiti to create a database table
猜你喜欢

flow

vscode配置用户代码片段(包括删除方法)

From cloud native to intelligent, in-depth interpretation of the industry's first "best practice map of live video technology"

论文笔记:Swin-Unet: Unet-like Pure Transformer for MedicalImage Segmentation

Chinese character style migration --- diversity regularization stargan for Chinese character multi font generation

Handler learning

从云原生到智能化,深度解读行业首个「视频直播技术最佳实践图谱」

网络安全——使用Evil Maid物理访问安全漏洞进行渗透

网络安全——文件上传渗透测试

Chapter VI bus
随机推荐
From cloud native to intelligent, in-depth interpretation of the industry's first "best practice map of live video technology"
Sort method -- bubble sort (use an array to sort a string of numbers from large to small or from small to large)
深入浅出边缘云 | 2. 架构
网络安全——Web渗透测试
脑注意力机制启发的群体智能协同避障方法
Common doc commands
Queue (stack)
Network security - Web information collection
[paper reading] mean teachers are better role models
Repair the problem of adding device groups and editing exceptions on easycvr platform
Odoo+ test
Browser failed to get cookies, browser solution
CSDN垃圾的没有底线!
Browser type judgment
WSDM 22 | graph recommendation based on hyperbolic geometry
简易订单管理系统小练习
浅谈Node Embedding
How to generate expected data? Emory University and others' latest "deep learning controllable data generation" review, 52 page PDF, covering 346 documents, comprehensively expounds the controllable g
Flink综合案例(九)
Chapter VI bus