当前位置:网站首页>Summary of Intranet Information Collection
Summary of Intranet Information Collection
2022-07-28 06:18:00 【cainsoftware】
Preface
This article records some notes on Intranet penetration , The information is scattered , Follow up update and improvement
Local information query : Frequently used information
Local service listwmic service list briefList of native processesTasklist /vBrowser proxy informationreg query "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings"RDP Port number (16 Base number )reg query "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-TCP" /V portNumberUser listnet userLocal Administratorsnet localgroup administratorsOnline usersquery user || qwinsta
Query and process of patch information related to rights raising
http://uuzdaisuki.com/2021/04/12/windows%E6%8F%90%E6%9D%83%E9%80%9F%E6%9F%A5%E6%B5%81%E7%A8%8B/
This machine 3389 Turn on
1. General motors 3389:
wmic RDTOGGLE WHERE ServerName='%COMPUTERNAME%' call SetAllowTSConnections 12.Win2003:
REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f3.Win2008:
REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f4.win08 win2003 win7 win2012 winxp
win08,win2012 All three orders ,win7 The first two :
wmic /namespace:\root\cimv2 erminalservices path win32_terminalservicesetting where (__CLASS != "") call setallowtsconnections 1wmic /namespace:\root\cimv2 erminalservices path win32_tsgeneralsetting where (TerminalName ='RDP-Tcp') call setuserauthenticationrequired 1reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fSingleSessionPerUser /t REG_DWORD /d 0 /f
Antivirus software process name
360sd.exe 360 antivirus360tray.exe 360 Real time protectionZhuDongFangYu.exe 360 Active defenseKSafeTray.exe Jinshan guardSafeDogUpdateCenter.exe Server security dogMcAfee McShield.exe McAfeeegui.exe NOD32AVP.EXE kasperskyavguard.exe Avira antivirbdagent.exe BitDefender
Access to sensitive information
Source code Database backup files Browser password 、cookie3389、ipc Connection record vpn Hash extraction http://uuzdaisuki.com/2021/04/22/windows%E5%93%88%E5%B8%8C%E6%8F%90%E5%8F%96%E6%96%B9%E5%BC%8F%E6%80%BB%E7%BB%93/
Domain information or intranet information collection
After getting one shell after , You need to first judge whether this machine has a domain environment 、 Out of network 、 Whether there are multiple network cards 、 What are the intranet segments .
View network configuration informationipconfig /allifconfigDetermine the primary domainnet time /domain
Choose different proxy methods according to whether you are out of the network , If the target goes out of the network , May adopt frp And so on , There are webshell , etc. , May adopt reGeorg And so on .
View the network configuration information of the current machine , according to ip The address and subnet mask infer the possible intranet segment . To confirm whether it is necessary for us to set up an agent .
In domain information collection
net view View the list of machines in the domainnet view /domain: ZZZ see ZZZ List of all machines in the domain .net group /domain Query the list of all user groups in the domainnet group "domain computers" /domain View a list of all domain member computersnet accounts /domain Query domain user password expiration and other informationnet user /domain Get the list of domain usersnet group "domain admins" /domain Get the list of domain Administratorsnet group "domain controllers" /domain View domain controllersnet local group administrators View local Administrators group users [ Usually contains domain users ]net localgroup administrators /domain Log in to the domain administrator usernet view /domain Check how many domains exist in the intranet
Domain command execution
http://uuzdaisuki.com/2021/04/29/%E5%9F%9F%E6%B8%97%E9%80%8F%E4%B8%AD%E5%88%A9%E7%94%A8ipc%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%80%BB%E7%BB%93/
Bill delivery
http://uuzdaisuki.com/2021/04/21/%E7%A5%A8%E6%8D%AE%E4%BC%A0%E9%80%92%E6%94%BB%E5%87%BB/
Sensitive system collection
Domain controlOA SystemFinancial systemDatabase systemMail serverFile serverOfficial website serverPersonnel system
Intranet information collection
There are two ways to scan the target intranet , One is to scan through an agent , One is in shell Upload and install the scanning tool .
Uploading scanning tools should consider the other party's system 、 Environment, etc
ping Detection survival
1、 If IP continuity , for example (192.168.1.1-192.168.1.10):@echo off&setlocal ENABLEDELAYEDEXPANSIONif exist onlist.txtif exist offlist.txtfor /l %%i in (1,1,10) do (ping -n 1 192.168.1.%%i>nul 2>nulif !errorlevel!==0 (echo 192.168.1.%%i >>c:\bat\onlist.txt) else (echo 192.168.1.%%i >>c:\bat\offlist.txt))2、 If IP Discontinuous , Then use a file plist Write the address list to be tested , And then batch :@echo off&setlocal ENABLEDELAYEDEXPANSIONif exist c:\bat\onlist.txt del c:\bat\onlist.txtif exist c:\bat\offlist.txt del c:\bat\offlist.txtfor /f %%i in (c:\bat\pclist.txt) do (ping -n 1 %%i>nul 2>nulif !errorlevel!==0 (echo %%i >>c:\bat\onlist.txt) else (echo %%i >>c:\bat\offlist.txt))
Self writing python Script probe port
because linux Systems and programmers use windows The environment generally exists python Environmental Science , Use self writing python Script portscan Scanning intranet ports is also very convenient
List of commonly used scanning ports
21,22,80,443,445,1433,1521,3306,3389,5900,6379,7001,8000,8080,8443
Common ports in the intranet correspond to service attacks
For all kinds of services
Use the blasting tool to obtain the password , Key attack :
FTP( 21 / TCP)
SSH( 22 / TCP)
Telnet( 23 / TCP)
NetBIOS / SMB / Samba( 139 / TCP and 445 / TCP)
LDAP( 389 / TCP)
Kerberos( 88 / TCP)
RDP / Terminal services ( 3389 / TCP)
HTTP(S) / HTTP management service ( 80 / TCP and 443 / TCP)
MSSQL( 1433 / TCP)
Oracle( 1521 / TCP)
MySQL( 3306 / TCP)
VNC( 5900 / TCP)
Other unauthorized access ports
Redis(6379)
MongoDB(27017)
Elasticsearch(9200)
ZooKeeper(2181,2182)
docker(2375)
Memcached(11211)
nfs(2049)
CouchDB(5984)
hadoop(50070)
other
Weblogic(7001/weblogic Deserialization )
Zabbix (8069/ Command execution )
Jenkins(8080-8089/ Console command execution )
JBoss(8080-8089/ Deserialization )
边栏推荐
- 生活随机-1
- 机器学习之聚类
- 1、 Speech synthesis and autoregressive model
- 说说ESXi虚拟交换机和端口组的“混杂模式”
- Reversible watermarking method based on difference expansion
- Reinforcement learning - Basic Concepts
- Byte Android post 4 rounds of interviews, received 50k*18 offers, and successfully broke the situation under the layoff
- Interviewer: let you design a set of image loading framework. How would you design it?
- GF(2^8)的加法与乘法计算
- On low resolution face recognition in the wild:comparisons and new technologies
猜你喜欢

What are the detailed steps of wechat applet development?

Tf.keras build neural network function expansion

The number of password errors during login is too many, and the user is blocked,

一个票据打印实例

关于接触器线圈控制电路设计分析

ESXi 7.0 Update 1c中加入的systemMediaSize启动选项

Deep learning (incremental learning) -- iccv2021:ss-il: separated softmax for incremental learning

Deep learning (self supervision: Moco V2) -- improved bases with momentum contractual learning

Protecting Against DNN Model Stealing Attacks 论文阅读心得

深度学习——Patches Are All You Need
随机推荐
关于Fusion on Apple Silicon的谨慎猜测
Nsctf web Title writeup
The number of password errors during login is too many, and the user is blocked,
EIGamal 密码体制描述
Reversible watermarking method based on difference expansion
CString转char[]函数
《AdaFace: Quality Adaptive Margin for Face Recognition》用于人脸识别的图像质量自适应边缘损失
基于差值扩展的可逆水印方法
将GrilView中的数据转换成DataTable
Deep learning - metaformer is actually what you need for vision
物联网互操作系统:分类、标准与未来发展方向综述
Adaface: quality adaptive margin for face recognition image quality adaptive edge loss for face recognition
硬件电路设计学习笔记2--降压电源电路
Internet of things interoperability system: classification, standards and future development
What is the process of building a small program?
frameset 用法示例
Transformer's understanding
Deep learning (self supervised: Moco V3): An Empirical Study of training self supervised vision transformers
Deep learning (self supervision: CPC V2) -- data efficient image recognition with contractual predictive coding
Which enterprises are suitable for small program production and small program development?