Jump to content

Title: VulnStack ATT\u0026CK 5 Shooting Range

Featured Replies

Posted

VulnStack ATTCK 5 靶场

信息搜集

端口扫描

Using nmap to scan the port, it was found that two ports : 80 and 3306 were opened

20200323152943.png-water_print

Visit port 80 and found that it is a site that thinkphp v5

20200323143842.png-water_print

Any access to an error page to get its version number is 5.0.22

20200323143851.png-water_print

漏洞搜索

searchsploit search related vulnerabilities:

20200323144520.png-water_print

20200323144508.png-water_print

Try to use EXP to execute the command ipconfig, as shown in the figure below :

20200323144530.png-water_print

漏洞利用

View permissions:

20200323153315.png-water_print

View the web directory:

20200323153239.png-water_print

Write to the shell:

20200323153256.png-water_print

生成远控

新建 listener

20200323153614.png-water_print

生成 payload

20200323153650.png-water_print

上传远控

Connect to webshell:

20200323153444.png-water_print

Upload:

20200323153734.png-water_print

implement:

20200323153800.png-water_print

The rebound shell:

20200323153834.png-water_print

Execute shell whoami:

20200323160308.png-water_print

权限提升

Create a new listener for use as a power increase and other operations

(Smb and tcp are both OK, I chose tcp, smb suitable for horizontal direction)

20200323161941.png-water_print

The author removed the escalation of vulnerability exp in cs4.0 and can be re-added to cs at https://github.com/rsmudge/ElevateKit.

Using exp with the ms14-058 vulnerability to escalate rights:

20200323162110.png-water_print

20200323162356.png-water_print

20200323162402.png-water_print

横向移动

Check the process through explore-Process List to see if there is any antivirus software (operating in local system)

20200323162658.png-water_print

I found that there was no antivirus software, so that our future horizontal movement activities would be smoother.

关闭防火墙

Use the command netsh advfirewall set allprofiles state off Close the firewall

20200323162821.png-water_print

内网的信息搜集

(Operate in local admin first, because the system permissions cannot see the login domain)

获取当前登录域

Get the login domain through the command net config workstation

20200323163025.png-water_print

We can see that the workstation domain is sun.com, but now the domain is win7. Therefore, we need a domain user process to collect information

Before this, call Logonpasswords to grab a wave of passwords (it is OK to operate on local admin and local system)

20200323163627.png-water_print

Utilize password:

The first type of : is called using make_token

The second type of : uses the pth command to generate a new process and inject it into

The third type of : uses spawn as

These three methods need to be used to call the credentials we just crawled to continue the complete corresponding information collection operation.

The first type: Make_token Make_token is an identity forgery on the current beacon

On the current beacon, your permissions, permissions, or identity have not changed. However, when you interact with remote resources, you are using your fake identity.

Use the rev2self command to discard the password

20200323164151.png-water_print

20200323164230.png-water_print

The second type of : PTH Pth (pth will generate a process. After generation, we need steel_token. After steel_token, we also use rev2self to discard the password)

20200323164437.png-water_print

Use the command steal_token 7912:

20200323164529.png-water_print

The third type: Spawnas

spawnas command generates beacon: with other user credentials

20200323164802.png-water_print

Of course, in addition to this, you can use Processes inject to directly inject the process into a certain user (the operation here requires system permission, and operate in local system)

查看内网的主机/域主机

Use the net view command to view the host of the intranet (adding the domain name is to view the domain host)

20200323174136.png-water_print

查看信任域

Use net domain_trusts to view trust domains

20200323174326.png-water_print

查看域内计算机

Use net computers {dns name of the domain, here is sun.com} to view the computers in the domain:

20200323174515.png-water_print

查看域控

Use net dclist {domain name, here is sun} to view domain control :

20200323174624.png-water_print

查看域管理员

Use net group \\{domain control name, here is DC} domain admins View domain administrator :

20200323174807.png-water_print

查看域和用户的 sid

Use whoami /all to view domain and user sid:

20200323174956.png-water_print

信息汇总

1

2

3

4

5

6

7

8

9

10

11

Domain name :sun.com

Domain Administrator :sun\administrator

Domain user :administrator, admin, leo and a krbtgt

Domain control :DC

Domain member :DC, Win7

Domain control ip:192.168.138.138

User sid:S-1-5-21-3388020223-1982701712-4030140183-1110

Domain sid:S-1-5-21-3388020223-1982701712-4030140183

Known credentials :

sun\leo:123.com

win7\heart:123.com

域提权

Using ms14-068 domain escalation

20200323175842.png-water_print

Import fake cache :

20200323180100.png-water_print

20200323180147.png-water_print

横向到域控

(operate on the beacon of domain user)

Create a listener here as a horizontal demonstration, with the name Lateral Movement, I chose smb_beacon to be better, smb beacon can pass through the firewall, and the movement and smb beacon is small.

(In cs4.0, there are jump and remote-exec commands)

Click View-Target:

20200323180522.png-water_print

Because we already have permission to access DC, just check the following to use the current password :

20200323180653.png-water_print

DC successfully launched:

20200323180810.png-water_print

20200323180942.png-water_print

权限维持

黄金票据

First use logonpasswords to catch a wave of plain text (operate in a Beacon named DC)

20200323181311.png-water_print

Use the dcsync command to export NTLM Hash of krbtgt, or use hashdump to export hash

20200323181439.png-water_print

To facilitate the practice of gold notes, a new domain user geekby: was manually generated

20200323184757.png-water_print

20200323185108.png-water_print

20200323185125.png-water_print

20200323185136.png-water_print

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.