小谈RADMIN

转载请保留版权信息!谢谢合作!
by NetPatch
welcome www.nspcn.org and www.icehack.com

最近做渗透测试时常碰到RADMIN一类的东西..
一碰到此类的程序,一般我都会先看下对方把RADMIN的端口配置成什么..以及相应的PASS(加密过的)
HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\Parameters\Parameter //默认密码注册表位置
HKEY_LOCAL_MACHINE\SYSTEM\RAdmin\v2.0\Server\Parameters\Port //默认端口注册表位置
//把海阳读出来的,用逗号格开,然后用下面的代码转换就可以了


Dim theStr
theStr = InputBox( "请输入要转换的密码:", "输入", "44,41,43,32,43,5,45,64,43,24,31,53,46,57,64,86" )
If theStr <> "" Then
Call InputBox("请复制已经转换好的密码",,zpass(theStr))
End If
Function zpass(pass)
tpass=""
MyArray = Split(pass, ",", -1, 1)
For each thepass in MyArray
if len(thepass) = 1 then
tpass=tpass+"0"
end if
tpass=tpass+hex(thepass)
Next
zpass=tpass
End Function

//转换后的,就可以拿爆破工具去跑了….

端口读出后类似这样 223,34,0,0
//用下面代码转换即可

Dim theStr
theStr = InputBox( "请输入要转换的端口:", "输入", "223,34,0,0," )
da = Split(thestr, ",", -1, 1)
If theStr <> "" Then
Call InputBox("请复制已经转换好的端口",,Hex2Dec(Dec2Hex(da(3))&Dec2Hex(da(2))&Dec2Hex(da(1))&Dec2Hex(da(0))))
End If

Function Hex2Dec(Hex)
Hex = UCase(Hex)
For i = 1 To Len(Hex)
Select Case Mid(Hex, Len(Hex) - i + 1, 1)
Case "0": B = B + 16 ^ (i - 1) * 0
Case "1": B = B + 16 ^ (i - 1) * 1
Case "2": B = B + 16 ^ (i - 1) * 2
Case "3": B = B + 16 ^ (i - 1) * 3
Case "4": B = B + 16 ^ (i - 1) * 4
Case "5": B = B + 16 ^ (i - 1) * 5
Case "6": B = B + 16 ^ (i - 1) * 6
Case "7": B = B + 16 ^ (i - 1) * 7
Case "8": B = B + 16 ^ (i - 1) * 8
Case "9": B = B + 16 ^ (i - 1) * 9
Case "A": B = B + 16 ^ (i - 1) * 10
Case "B": B = B + 16 ^ (i - 1) * 11
Case "C": B = B + 16 ^ (i - 1) * 12
Case "D": B = B + 16 ^ (i - 1) * 13
Case "E": B = B + 16 ^ (i - 1) * 14
Case "F": B = B + 16 ^ (i - 1) * 15
End Select
Next
Hex2Dec = B
End Function
Function Dec2Hex(Dec)
Dec2Hex = ""
Do While Dec > 0
a = CStr(Dec Mod 16)
Select Case a
Case "10": a = "A"
Case "11": a = "B"
Case "12": a = "C"
Case "13": a = "D"
Case "14": a = "E"
Case "15": a = "F"
End Select
Dec2Hex = a & Dec2Hex
Dec = Dec \ 16
Loop
End Function

相关日志

楼被抢了 5 层了... 抢座Rss 2.0或者 Trackback

  • netpatch

    —————————
    Windows 脚本宿主
    —————————
    脚本: radmin-pass.vbs
    行: 15
    字符: 3
    错误: 类型不匹配: 'thepass'
    代码: 800A000D
    源: Microsoft VBScript 运行时错误

    —————————
    确定
    —————————
    有很多人说.代码有问题…
    估计都是碰到上面的错误吧….
    这个错误是由于在要转的数据后面还多加了个逗号引起的.

  • hutu

    貌似代码有点小问题?

  • nnpp

    反正数据中有不是十六进制的数据,转换的时候都会如此

  • 疏林阁

    还素要爆破。。。

    如果有直接读密码的就好了

  • 鬼仔

    @疏林阁 其实能读出来hash就好办了
    http://huaidan.org/archives/1347.html
    http://huaidan.org/archives/1380.html
    提权的时候比较好用

发表评论