当前位置:网站首页>Network security - penetration using evil maid physical access security vulnerabilities
Network security - penetration using evil maid physical access security vulnerabilities
2022-07-24 13:41:00 【Beluga】
Use Evil Maid Penetration of physical access security vulnerabilities
First step , Open the network topology , Start the experimental virtual machine , View the virtual machines separately IP Address :
Windows 2012-2

Windows 2012-1

The second step , Enter the infiltration machine Windows 2012-2, Click the first icon on the right of the start menu to enter the server manager , Click the icon of the flag to configure after deployment , Choose to promote this server to a domain controller

In deployment configuration , Select Add New Forest (F), And fill in the root domain name of the forged domain server , The root domain name depends on the host in the domain Windows 2012-1 Fill in the fields shown in pyseclabs.com


And then click next , Enter the domain controller option and fill in the directory service restore mode password [email protected]

Next DNS Options directly select next

Other options go directly to the next step


Click next to enter the prerequisite check , Choose next

Choose to install

Click restart server after installation .

The third step , Switch to Windows 2012-1, Simulate the normal login of users , Get into CMD The command line uses commands ipconfig -all | findstr DNS

During the routine penetration test , Penetration testers should do a good job in domain name deception or resolution in advance , Make the address of the victim's host resolution server point to the forged server address , For the convenience of observing the experimental effect, the analytical steps are omitted here , Directly set the domain user configuration DNS The address is 172.16.1.100, Use command shutdown -l Unregister domain host

Step four , Enter the infiltration machine Windows 2012-2(ROGUEDC) Modify user name in administrator Password , And set that this user must change the password for the next login .
Click on the left dashboard AD DS, Right click the server name ROGUEDC The host , find Active Directory Users and computers

Click , Find the user Administrator, Right click to select reset password

Fill in the password ZkPy2020..666( Be careful ZP All in capitals ), Check that the user must change his password when logging in next time

Tips Administrator Your password has been changed

Step five , Switch to the target login interface , Click on PYSECLABS\Administrator, Type the modified user name and password (Administrator\ZkPy2020..666)

Prompt before login , The user's password must be changed ,

For administrator users Administrator Change your password

Prompt that your password has been changed , Explain the administrator user Administrator Your password has been modified successfully

Step six , Switch to the forged domain server , Click in the lower right corner to open the network and Sharing Center

Select change adapter settings

Right click Ethernet , Select disable

Step seven , Switch to the target login interface , Log in again with the modified user name and password , Wait patiently , It may take a long time to enter the desktop

After entering the system, use CMD command whoami Check whether the current user permission is Administrator

边栏推荐
- Experience sharing | how to use SaaS for enterprise knowledge management
- Question 10: find numbers in an array with rows and columns in order
- 为什么函数式接口 Comparator 中有 “两个抽象方法”?
- Exploration of sustainable learning ability to support the application of ecological evolution of Pengcheng series open source large models
- Dtcloud uses custom fonts
- CSDN garbage has no bottom line!
- Summary of embedded network problems (packet loss of network card, unrecognized network card)
- 浅谈Node Embedding
- Research and progress of traffic situation awareness based on social media data enhancement
- Network security - function bypass injection
猜你喜欢

网络安全——Cookie注入

Why are there "two abstract methods" in the functional interface comparator?

Unity UGUI中scroll bar在游戏中启动界面时没有从最上面显示

Inversion of array (output in reverse order) (define an array and assign a value to output the array in reverse order)

CSDN垃圾的没有底线!

Experience sharing | how to use SaaS for enterprise knowledge management

游戏思考04总结:针对帧、状态、物理同步的总结(之前写的太长,现在简略下)

Aike AI frontier promotion (7.24)

Bayesian width learning system based on graph regularization

Network security -- man in the middle attack penetration test
随机推荐
AtCoder Beginner Contest 261 F // 树状数组
Group intelligence decision-making in an open environment: concepts, challenges and leading technologies
Interview question 01.02. determine whether it is character rearrangement
Common doc commands
An error is reported when using activiti to create a database table,
Happy number ~ ~ ~ (in fact, I'm not happy at all) & ugly number
Group knowledge map: distributed knowledge transfer and federated map reasoning
How to render millions of 2D objects smoothly with webgpu?
Chat room project
Flex layout
Knowledge sharing | sharing some methods to improve the level of enterprise document management
Common OJ questions of stack and queue
Integer inversion of force deduction questions
[paper reading] temporary binding for semi-superior learning
指针进阶部分(1)
Mongodb uses mongotemplate operations to add, delete, modify, query, page, sort, aggregate (including embedded data), file upload and download
Outdoor billboards cannot be hung up if you want! Guangzhou urban management department strengthens the safety management of outdoor advertising
Repair the problem of adding device groups and editing exceptions on easycvr platform
Data formatting widget
网络安全——文件上传渗透测试