解剖安全帐号管理器(sam)结构Anatomical safety Account
Manager (SAM) structure
Article source: www.opengram.com
Article submission: refdom
HomePage: www.opengram.com
I, abstract
I I, about SAM
III, the SAM database structure in the registry
The structure and main content of IV and SAM databaseV, conclusions about SAM database analysis
I. s umm ary
The analysis of the security account manager structure was donemore than a month ago and only fragmentary records were notposted. The main issue is not released
The reason is that the security account manager (SAM) is thecore of WIN system account management, and it' s very systematic,and I also have a lot of room for just pushing
Break and guess, while SAM hack may cause the lsass.exe to loadaccount manager error when started, even security mode can not
be repaired (start up)
It must load SAM) to cause the whole system to start crashing(I usually need to rely on the second system to delete the SAMfile to start it) . As for now released
That is mainly because the Adam and the "Administrator" Dingclone described rootkit way of concealment and harmfulness, thestructure of SAM
Familiarity can help security personnel to do security testing(and, of course, to make use of undesirable candidates) .The contents of SAM are only introduced here, and the Securityrelated ones are not public for the time being.
Two, about SAM
Don' t get it wrong, SAM, it' s not a file, Sam is so simple. SAM(Security Accounts Manager security account manager) isresponsible for
Control and maintenance of SAM database. The SAM database islocated under the registry HKLM\SAM\SAM, protected by ACL, andcan be opened using regedt32.exe
Book table editor and set the appropriate permissions to viewthe contents of SAM. The SAM database is stored on the disk inthe%systemroot%system32\conf ig\ directory
Recorded in the SAM file, in this directory also includes a
security file, the contents of the security database, there aremany relations between the two.
The SAM database contains information about all groups,accounts, including passwords, HASH, accounts, SID, and so on.These are described in detail later. Points to me
Case analysis of Chinese Win2K Adv Server.
Three 、 the structure of the SAM database in the registryExpand registry HKLM\SAM\SAM\:
H KLM---SAM
|---SAM
|---Domains
| |---Account
| | |---Aliases
| | | |---Members
| | | |---Nam e s
| | |---Group s
| | | |---00000201
| | | |---Nam e s
| | | |---None
| | |---Users
| | |---000001F4
| | |---000001F5
| | |---000003E8
| | |---000003E9
| | |---Names
| | |---Adaministrator| | |---Gu e s t
| | |---IU SR_REFDOM| | |---IWASM_REFDOM| |---Builtin
| |---Aliases
| | |---00000220
| | |---00000221
| | |---00000222
| | |---00000223
| | |---Me mbe r s
| | | |---S-1-5-21-1214440339-706699826-1708537768| | | |---000001 F4
| | | |---000001F5
| | | |---000003E8
| | | |---000003E9
| | |--- Name s
| | |---Administrators
| | |---Users
| | |---Gu e s t s
| | |---Power Users
| |---Groups
| | |---Names
| |
| |---Users
| |---Name s
|
|---RXA CT
This is the SAM tree in the registry on my machine.
Comparing the contents of the SAM file, you can see that theSAM tree in the registry is in fact the same as in the SAM file.However, the SAM file is listed first
RXACT then, in the Domains content (and so on) , the order ofexpression in the file is in reverse order with the tree orderin the registry. If used to seeing
File contents, from file 0000H to 0006Ch,
Indicates the location of the SAM database:
\systemroot\system32\conf ig\sam, but
The end is blank, until 01000h (hbin) , from here on, is thecontent of the entire database. The contents of the SAM databasefile are not included,
But it will be interspersed with the introduction, interestedin their own to study.
Four, SAM database structure and main content:
In the entire database, the main contents of the account existin the following locations:
Under \Domains\ is the SAM content in the domain (or local) ,with two branches, Account, and Builtin".
\Domains\Account is the user account content.
\Domains\Account\Users is the information of each account. Thesub key is the SID relative symbol of each account. Such as000001F4,
Each account has two sub items, F and V. Where \Names\ is theuser account name, each account name has only one default subkey,and the type in the item is not
Is the generic registry data type, but refers to the last item(relative identifier) of the SID that signs the account, suchas the Administrator under it,
The type is 0x1F4, so the 000001F4 from the front correspondsto the content of the account name administrator. This showsthe logic of MS account search.
Inference 1: from the registry structure to see the account,if you query an account name refdom related information, then,Microsoft from the account name refdom
Find its type, 0x3EB, and then find the relative sign (or SID)for the account content of 000003EB. All API functions (suchas NetUserEnum ())
That' s how it works. Therefore, if you change the type 0x3EBin the refdom account to 0x1F4, the account will be directedto the account of class 000001F4
Households. And this account 000001F4 is the administratoraccount, so that the system in the login process, the refdomaccount completely converted to administrator
Account, account refdom all content used, information isadminisrtator content, including passwords, permissions,desktop, records, access time and so on
Etc. . This inference should be true, but it will mean that twouser names correspond to one user' s information and that thereshould be an error in system startup!
The inference is that, in the previous analysis of the structure,the relationship between the account name and the SIDassociation was revealed during and after the login process.\Domains\Account\Users\000001F4, this is the accountinformation for administrator (other similar) . There are twosub items, V and F.
In the project V, the basic information of the account is kept,the user name, the user' s full name (full name) , the group, thedescription, the password, the hash, the annotation, and
whether it can be more
Change password, account enable, password setup time, etc. . Inthe project F, some login records are saved, such as the lastlogin time, the wrong login number, and so on
One important place is the SID relative symbol for this account.Before the analysis of the structure, did not pay attention tothis place, this is the idea put forward by Adam. This is wherethe SID relative sign is registered
An account in the table for two times, one is in the key of000001F4, another is the key content of F sub items, from fourbytes 48 to 51:
F4 010000, which is actually a long type variable, that is,000001 F4. When a flag appears in two places, it will happenSynchronization problem. Obviously, Microsoft has made themistake. The two variable should have been unified to mark auser account, but Microsoft played two variables separatelyBut there is no synchronization.
The 000001F4 in the subkey is used to correspond to the username administrator, which facilitates querying the accountinformation through the user, such as LookupAccountSid () andso on
The account related API function is used to locate user
hypervmart怎么样?hypervmart是一家成立了很多年的英国主机商家,上一次分享他家还是在2年前,商家销售虚拟主机、独立服务器和VPS,VPS采用Hyper-V虚拟架构,这一点从他家的域名上也可以看出来。目前商家针对VPS有一个75折的优惠,而且VPS显示的地区为加拿大,但是商家提供的测速地址为荷兰和英国,他家的优势就是给到G口不限流量,硬盘为NVMe固态硬盘,这个配置用来跑跑数据非常...
ShockHosting商家在前面文章中有介绍过几次。ShockHosting商家成立于2013年的美国主机商,目前主要提供虚拟主机、VPS主机、独立服务器和域名注册等综合IDC业务,现有美国洛杉矶、新泽西、芝加哥、达拉斯、荷兰阿姆斯特丹、英国和澳大利亚悉尼七大数据中心。这次有新增日本东京机房。而且同时有推出5折优惠促销,而且即刻使用支付宝下单的话还可获赠10美金的账户信用额度,折扣相比之前的常规...
Contabo是一家运营了20多年的欧洲老牌主机商,之前主要是运营德国数据中心,Contabo在今年4月份增设新加坡数据中心,近期同时新增了美国纽约和西雅图数据中心。全球布局基本完成,目前可选的数据中心包括:德国本土、美国东部(纽约)、美国西部(西雅图)、美国中部(圣路易斯)和亚洲的新加坡数据中心。Contabo的之前国外主机测评网站有多次介绍,他们家的特点就是性价比高,而且这个高不是一般的高,是...