解剖安全帐号管理器(sam)结构Anatomical safety Account
Manager (SAM) structure
Article source: www.opengram.com
Article submission: refdom
HomePage: www.opengram.com
I, abstract
I I, about SAM
III, the SAM database structure in the registry
The structure and main content of IV and SAM databaseV, conclusions about SAM database analysis
I. s umm ary
The analysis of the security account manager structure was donemore than a month ago and only fragmentary records were notposted. The main issue is not released
The reason is that the security account manager (SAM) is thecore of WIN system account management, and it' s very systematic,and I also have a lot of room for just pushing
Break and guess, while SAM hack may cause the lsass.exe to loadaccount manager error when started, even security mode can not
be repaired (start up)
It must load SAM) to cause the whole system to start crashing(I usually need to rely on the second system to delete the SAMfile to start it) . As for now released
That is mainly because the Adam and the "Administrator" Dingclone described rootkit way of concealment and harmfulness, thestructure of SAM
Familiarity can help security personnel to do security testing(and, of course, to make use of undesirable candidates) .The contents of SAM are only introduced here, and the Securityrelated ones are not public for the time being.
Two, about SAM
Don' t get it wrong, SAM, it' s not a file, Sam is so simple. SAM(Security Accounts Manager security account manager) isresponsible for
Control and maintenance of SAM database. The SAM database islocated under the registry HKLM\SAM\SAM, protected by ACL, andcan be opened using regedt32.exe
Book table editor and set the appropriate permissions to viewthe contents of SAM. The SAM database is stored on the disk inthe%systemroot%system32\conf ig\ directory
Recorded in the SAM file, in this directory also includes a
security file, the contents of the security database, there aremany relations between the two.
The SAM database contains information about all groups,accounts, including passwords, HASH, accounts, SID, and so on.These are described in detail later. Points to me
Case analysis of Chinese Win2K Adv Server.
Three 、 the structure of the SAM database in the registryExpand registry HKLM\SAM\SAM\:
H KLM---SAM
|---SAM
|---Domains
| |---Account
| | |---Aliases
| | | |---Members
| | | |---Nam e s
| | |---Group s
| | | |---00000201
| | | |---Nam e s
| | | |---None
| | |---Users
| | |---000001F4
| | |---000001F5
| | |---000003E8
| | |---000003E9
| | |---Names
| | |---Adaministrator| | |---Gu e s t
| | |---IU SR_REFDOM| | |---IWASM_REFDOM| |---Builtin
| |---Aliases
| | |---00000220
| | |---00000221
| | |---00000222
| | |---00000223
| | |---Me mbe r s
| | | |---S-1-5-21-1214440339-706699826-1708537768| | | |---000001 F4
| | | |---000001F5
| | | |---000003E8
| | | |---000003E9
| | |--- Name s
| | |---Administrators
| | |---Users
| | |---Gu e s t s
| | |---Power Users
| |---Groups
| | |---Names
| |
| |---Users
| |---Name s
|
|---RXA CT
This is the SAM tree in the registry on my machine.
Comparing the contents of the SAM file, you can see that theSAM tree in the registry is in fact the same as in the SAM file.However, the SAM file is listed first
RXACT then, in the Domains content (and so on) , the order ofexpression in the file is in reverse order with the tree orderin the registry. If used to seeing
File contents, from file 0000H to 0006Ch,
Indicates the location of the SAM database:
\systemroot\system32\conf ig\sam, but
The end is blank, until 01000h (hbin) , from here on, is thecontent of the entire database. The contents of the SAM databasefile are not included,
But it will be interspersed with the introduction, interestedin their own to study.
Four, SAM database structure and main content:
In the entire database, the main contents of the account existin the following locations:
Under \Domains\ is the SAM content in the domain (or local) ,with two branches, Account, and Builtin".
\Domains\Account is the user account content.
\Domains\Account\Users is the information of each account. Thesub key is the SID relative symbol of each account. Such as000001F4,
Each account has two sub items, F and V. Where \Names\ is theuser account name, each account name has only one default subkey,and the type in the item is not
Is the generic registry data type, but refers to the last item(relative identifier) of the SID that signs the account, suchas the Administrator under it,
The type is 0x1F4, so the 000001F4 from the front correspondsto the content of the account name administrator. This showsthe logic of MS account search.
Inference 1: from the registry structure to see the account,if you query an account name refdom related information, then,Microsoft from the account name refdom
Find its type, 0x3EB, and then find the relative sign (or SID)for the account content of 000003EB. All API functions (suchas NetUserEnum ())
That' s how it works. Therefore, if you change the type 0x3EBin the refdom account to 0x1F4, the account will be directedto the account of class 000001F4
Households. And this account 000001F4 is the administratoraccount, so that the system in the login process, the refdomaccount completely converted to administrator
Account, account refdom all content used, information isadminisrtator content, including passwords, permissions,desktop, records, access time and so on
Etc. . This inference should be true, but it will mean that twouser names correspond to one user' s information and that thereshould be an error in system startup!
The inference is that, in the previous analysis of the structure,the relationship between the account name and the SIDassociation was revealed during and after the login process.\Domains\Account\Users\000001F4, this is the accountinformation for administrator (other similar) . There are twosub items, V and F.
In the project V, the basic information of the account is kept,the user name, the user' s full name (full name) , the group, thedescription, the password, the hash, the annotation, and
whether it can be more
Change password, account enable, password setup time, etc. . Inthe project F, some login records are saved, such as the lastlogin time, the wrong login number, and so on
One important place is the SID relative symbol for this account.Before the analysis of the structure, did not pay attention tothis place, this is the idea put forward by Adam. This is wherethe SID relative sign is registered
An account in the table for two times, one is in the key of000001F4, another is the key content of F sub items, from fourbytes 48 to 51:
F4 010000, which is actually a long type variable, that is,000001 F4. When a flag appears in two places, it will happenSynchronization problem. Obviously, Microsoft has made themistake. The two variable should have been unified to mark auser account, but Microsoft played two variables separatelyBut there is no synchronization.
The 000001F4 in the subkey is used to correspond to the username administrator, which facilitates querying the accountinformation through the user, such as LookupAccountSid () andso on
The account related API function is used to locate user
妮妮云的来历妮妮云是 789 陈总 张总 三方共同投资建立的网站 本着“良心 便宜 稳定”的初衷 为小白用户避免被坑妮妮云的市场定位妮妮云主要代理市场稳定速度的云服务器产品,避免新手购买云服务器的时候众多商家不知道如何选择,妮妮云就帮你选择好了产品,无需承担购买风险,不用担心出现被跑路 被诈骗的情况。妮妮云的售后保证妮妮云退款 通过于合作商的友好协商,云服务器提供2天内全额退款,超过2天不退款 物...
中午的时候有网友联系提到自己前几天看到Namecheap商家开学季促销活动期间有域名促销活动的,于是就信注册NC账户注册域名的。但是今天登录居然无法登录,这个问题比较困恼是不是商家跑路等问题。Namecheap商家跑路的可能性不大,前几天我还在他们家转移域名的。这里简单的记录我帮助他解决如何重新登录Namecheap商家的问题。1、检查邮件让他检查邮件是不是有官方的邮件提示。比如我们新注册账户是需...
如今我们还有在做个人网站吗?随着自媒体和短视频的发展和兴起,包括我们很多WEB2.0产品的延续,当然也包括个人建站市场的低迷和用户关注的不同,有些个人已经不在做网站。但是,由于我们有些朋友出于网站的爱好或者说是有些项目还是基于PC端网站的,还是有网友抱有信心的,比如我们看到有一些老牌个人网站依旧在运行,且还有新网站的出现。今天在这篇文章中谈谈有网友问关于个人网站备案的问题。这个也是前几天有他在选择...