当前位置:网站首页>Actual combat memoir starts from webshell to break through the border

Actual combat memoir starts from webshell to break through the border

2022-06-29 08:26:00 Hetian network security laboratory

0e20d518ededdaf14d018a75c48d2c12.gif

Click blue

a463564d27acdc0bc2a24b376272412c.png

Pay attention to our

Text

A penetration of an authorized unit , Because of the php frame , some cms Upload , From realization webshell Start .

details

Add listening , Generate Trojan file and change the application name to hide online .

4d7f23ffaa1c41c490c6b26bceae9868.png

ca76314cc9df3433003c053a2d8b6c80.png

Change the sleep time to 10 second

dcbd9fa48457c3e70553c70ef1154591.png

View host name whoami

f80f30ea92eee5ac82fa9c0d135d7bd1.png

Grab the plaintext password

3f523528c26b89e7aa73baedf91a6155.png

Sure enough, the authority is not enough , Raise the right

40c0bbe81412ca9dcd7f03dde066c0c7.png

Try all kinds of potatoes , According to the patch, I didn't find ,winserver2012 Right to mention here ms16-075 Yes. , But the strange thing is CS Not online , Upload script to go online CS

9ea5e3333d61629b1a844c5dfdd0555d.png

However, it did not go online , The cost of trial and error is high

Check it out. winserver 2012 Right to the version of , Uploading multiple scripts does not work ,CS Your plug-in just hit , In fact, I don't know why I failed the first time I tried , It's strange

Restart a monitor

eed21b4680b9a1c172616b68bdc966fb.png

Continue to raise rights ,ms-058 It is possible to raise the right

78fdaa146362871dceedbedb7614ea2d.png

It was only the second time that the right was successfully raised

119ca363a2c3a76a6f7a387308978f7a.png

Modify sleep time , Neither too long nor too short is recommended , Grab the plaintext password

b59feb4974e2d769fef4e2886daf4d29.png

The plaintext password was successfully retrieved , Try to login remotely , Because in the early stage of information collection 3389 It's open .

Successfully logged in

057b6603c5466b6caac7acab2f1b90fd.png

Try to write scheduled task input permission maintenance , Here, you can choose to plan a task or dll Hijacking is OK , Here I choose to plan the task , After all, authorization projects don't worry about other problems , According to the preceding systeminfo Information at this time, we have obtained the permission of domain control , You can continue to perform intranet horizontal and domain penetration

42613de75d11ba42099ca7876e444b61.png

Of this network segment pc less , Intranet usually has other ip, Direct scan B paragraph

5965425c7707732cc9ed16bc8870b877.png

Get a lot of Intranet terminal information , however win10 Mostly ,win10 Of 445 Port utilization is generally blocked , Directly scan whether there are service classes , Such as ftp

The virtual terminal can execute , But no echo , You can only go up remotely

8b9719eaabbc3ee2b41c3ba5746b4da4.png

8d260f0307e6ab7c9065aa146e3e095d.png

There are a large number of terminals in the intranet , But there's no server , This is the only server , Small domain , At this time, the network topology of the intranet is roughly ,445 There are a large number of hosts open in the intranet

ac3a50dd737bb9cce9b4f1ba64ce7ca2.png

But I tried to use it for several times without success , Basically winserver If you use the server, you can get shell The probability is probably high ,win10 Your host has never been successful before , This time, I didn't get it shell

759000679e93698af1f0fb23ffd279c9.png

According to the obtained plaintext password , Password spraying for blasting

6105fd2384cc1cd8f06eed51ddc890e8.png

Get passwords for some accounts .

Query the currently logged in domain user

e0127357943cc4090fee02f03bbea2f2.png

Determine the host according to the host name queried above ip The address is 192.168.0.119,pth After the launch .

Summary

I don't know if it's a honeypot , But there are basically no servers in the intranet , The number of domain users is also small , Anyway, writing the report and handing it in will be over .

f1751817d18f0181cb82af532689e179.gif

laboratory 618 In great haste , stamp “ Read the original “ Participate in

原网站

版权声明
本文为[Hetian network security laboratory]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/180/202206290737396495.html