Jump to content

Title: Record a practical penetration of a certain pig-killing site

Featured Replies

Posted

Foreword

I saw an article in the middle of the night yesterday.

I thought I would practice my skills, and halfway through the fight, I found that the masters had already traumatized such sites. So I learned from the experience of the masters, and took some exercises and recorded whatever I thought of. So the writing was quite complicated, and I also recorded whether there were any solutions. Then I changed the site and continued to walk.

Information Collection

The front desk is like this

Image

Take a look at other information

Image Port Query

Image80 is the main page 8182 is the background login interface 1433 mssql Image directory scan

ImageCatalogue traversal

Image

Vulnerability Discovery

Go to the backend page first

Enter username: 123 prompts the user not exists Enter username: admin prompts the user or password is incorrect

Confirm the admin account and there is no verification code to verify, you can try to break it

Direct weak password admin 123456 Enter the background

Image There are not many functions, and there is nothing to use

Go back to the login to perform sql injection

Image Imagemssql, dba permissions, direct –os-shell

Image The first machine here did not leave the network and did not echo. I gave up. After searching for several sites, I finally found a website that was released and echoed (it was easy to solve as long as it was released).

Image

Image

CS is online

Try CS here and judge that the network directly generates powershell online

Image Image Image Check the information and check the tasklist

Image Currently, it is database permissions. I tried to increase the authority, but it was directly disconnected and the website could not be opened. You should use it with caution, collect sufficient information and collect sufficient patch information.

Image Another site was changed: Find the website path

Image Get a webshell first

ImageGodzilla's sweet potatoes are elevated to system

ImageCS plug-in sweet potatoes also successfully upgraded their rights

Image

Grab the administrator password

logonpasswords

Paid

ImageAdd to add a shadow account, administrator permissions

Image

Public network CS goes to intranet MSF through frp

First post, FRP+CS implement local Kali shell

Server (it's 5000 here, I forgot to take a screenshot after modifying)

Image Client

ImageMSF enables monitoring

ImageCS

Image

Subsequent

See if you can log in as an administrator by stealing the Token

getuid //View the current tokenuse incognito //Load incognitolist_tokens -u //List accesstokenimpersonate_token "

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.