Jump to content

Title: Infiltrate the third layer of the intranet into the working group’s intranet at one time [from 0 to 1 to break through all intranet machines]

Featured Replies

Posted

Preface

During an offensive and defensive drill, the team first got a Webshell, and then bounced the permissions to CobaltStrike to facilitate me to intranet penetration:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 By discovering that the current machine is a public network server, only the public network IP: xxx.xxx.xxx.16

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 By viewing the arp cache, I found that there are currently some public network machines:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

By querying these IPs, it is found that it is a 'a network', and through Nbtscan, it is found that the current C segment has a host that survives: (It is initially determined that the current C segment machine may have a domain, but it is not sure)

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

Move horizontally the C segment of the current first layer of intranet machine

Since it is an offensive and defensive drill, the more points you get, the better. I don’t consider some other issues here. After getting the current machine, I caught the plaintext password:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 However, using this password to use MSF to spray the C segment through password, it was found that no host was successfully horizontally:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

At this moment, I scanned again to see if there is any MS17010: (Generally speaking, there are basically several Eternal Blues for this kind of 'Xiang.com', so just scan it)

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

I found that the three units 92, 151, and 200 existed in MS17010, and then called 92 this unit:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Then MSF and CS were linked, and I popped the MSF shell to Cs again and maintained permissions:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

At this time, it is enough to use these two springboard machines. There is no need to continue to fight the other two MS17010. Then I collected information on the current C segment and scanned the web assets to survive and found a large number of web assets:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Through manual analysis, a SQL injection was found, and it was DBA permission:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Then an administrator user was added and then turned on 3389 (because of Norton, I don’t have time to do it for regular free kills, so I mainly got points, so I simply logged into the server directly)

And I can't connect directly through socks, which feels like a restriction. Later I found that using mstsc /admin can be logged in:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 At this time, I used 92 this machine as a springboard to log in remotely to the 71 desktop:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】The administrator's desktop was cloned:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 At this time, log in to the previously added account and go to the remote desktop. It is the administrator's desktop:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Through a series of information collection and password collection, we obtained the permissions of Mssql and all side stations:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Through the collected password, continue spraying the password on segment C successfully. Mssql: xxx.xxx.xxx.239

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

Then, I directly call XP_cmdshell to execute the command, and found that the permissions are still very large:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

Then use bitsadmin to go online to cs:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 At this time, the permissions of these three machines: 16, 92, and 239 were obtained, but the intranet was not discovered yet, and I was caught in a bottleneck at this time.

After getting to this point, I found that it was impossible to move horizontally. I don’t want to use 0day to hit other webs. I turned around and used MS17010 to hit 200 this one:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Then, in the same way, the shell was popped to CS and the user was added and the remote desktop group was added:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Then login found that login failed:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 At this time, using mstsc/admin can bypass and successfully log in to the target remote desktop:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

The administrator's desktop was cloned in the same way:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 I found a lot of valuable things, such as mstsc login records:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Get the navicat database credentials:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 and found that there are many SSH in Xshell:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

All Linux hosts can be logged in. At this time, you only need to use SharpDecryptPwd to grab their passwords, but a problem was found:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Use this thing to check the password later: (I didn’t want to use these things, so it’s too troublesome to check the password one by one)

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

I found that there are several machines with 10 intranets:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

Use the existing password to spray the Linux host in segment C horizontally:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 Then popped a few shells to MSF:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 So far, the C segment of this public network has basically been penetrated, and a large number of core databases, switches, and web servers have been taken down. The next step is to intranet penetration of 10 intranets.

Intranet penetration from the second layer of intranet 10 segments

Because I have obtained the root password, I directly scanned the B section of 10.10.10.1/16. There are a large wave of assets. I won’t take a screenshot here. There are hundreds of them, and I found that there are ESXI:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

And got an access control system:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 took down two SSHs of 10 segments horizontally through special means, and found that the third layer of intranet is 192 segments and docker environment:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

Since there is ESXI in 10 segments, I directly used the vulnerability to get the ESXI cloud platform, and all of its machines were accused:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】 At this time, the 10th section has basically been penetrated, and the next step is to penetrate the intranet of 192.

Intranet penetration from the third layer of intranet segment 192

I simply scanned the 192 paragraph through regular fscan and found that 192 assets are also very fat:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

Then two vulnerabilities of MS17010 were found:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

Now we have sorted out the relationship, and the current environment is as follows:

一次在工作组的内网里渗透到第三层内网【从 0 到 1 打穿所有内网机器】

Original link: https://mp.weixin.qq.com/s?__biz=MzkxNDEwMDA4Mw==mid=2247491421idx=1sn=769d715d05057112eb4ee1ebb8312e37chksm=c172c541f6054c571e482d42 83f946625f2689ec6214e9d47a61c66399ee7d2cd2a62c0de464scene=123key=f3d6282f44b990e0f2527af4db8e088f25f3e43d0abaf5f845ff52e14965e4fe188c890

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.