Ìá½»ÐèÇó
*
*

*
*
*
Á¢¼´Ìá½»
µã»÷¡±Á¢¼´Ìá½»¡±£¬±íÃ÷ÎÒÀí½â²¢Í¬Òâ ¡¶»Æ½ð³Ç¿Æ¼¼Òþ˽Ìõ¿î¡·

logo

    ²úÆ·Óë·þÎñ
    ½â¾ö·½°¸
    ¼¼ÊõÖ§³Ö
    ºÏ×÷·¢Õ¹
    ¹ØÓڻƽð³Ç

    ÉêÇëÊÔÓÃ
      »Æ½ð³Ç¹ÙÍøÊµÑéÊÒ | ÄÚÍøÉøÍ¸¡ªºáÏòÒÆ¶¯·½·¨×ܽᣨÏ£©
      ·¢²¼Ê±¼ä£º2020-11-06 ÔĶÁ´ÎÊý£º 425 ´Î

      ÉÏһƪÎÒÃǽéÉÜÁËÄÚÍøÉøÍ¸ÖкáÏòÒÆ¶¯µÄǰÁ½ÖÖ¹¥»÷·½·¨£ºÀûÓÃIPCºÍWindowsϵͳ·þÎñ¡£Í¨¹ýÒÔÉÏÁ½¸ö·½Ê½£¬ÎÒÃdzɹ¦µÄ½øÐÐÁ˼òµ¥µÄÄÚÍøºáÏòÒÆ¶¯¡£±¾ÆÚÎÒÃǽ«¼ÌÐø½éÉܺáÏòÒÆ¶¯µÄÆäÓà·½·¨£¬¶øÇÒÊǸü¼ÓÌù½üʵսµÄ·½Ê½£¬»°²»¶à˵£¬Ö±½Ó¿ªÊ¼£¡


      01¡¢ÀûÓÃPsExec¹¤¾ß½øÐкáÏòÉøÍ¸


      1£©PsExec¹¤¾ß½éÉÜ


      PsExec ÊÇ windows Ï·dz£ºÃµÄÒ»¿îÔ¶³ÌÃüÁîÐй¤¾ß¡£PsExecµÄʹÓò»ÐèÒª¶Ô·½Ö÷»ú¿ª·½3389¶Ë¿Ú£¬Ö»ÐèÒª¶Ô·½¿ªÆôadmin$¹²Ïí (¸Ã¹²ÏíĬÈÏ¿ªÆô)¡£µ«ÊÇ£¬¼ÙÈçÄ¿±êÖ÷»ú¿ªÆôÁË·À»ðǽ£¬PsExecÒ²ÊDz»ÄÜʹÓõÄ£¬»áÌáʾÕÒ²»µ½ÍøÂç·¾¶¡£ÓÉÓÚPsExecÊÇWindowsÌṩµÄ¹¤¾ß£¬ËùÒÔɱ¶¾Èí¼þ½«ÆäÁÐÔÚ°×Ãûµ¥ÖС£


      ¹¤¾ßÁ¬½Ó£º

      https://docs.microsoft.com/zh-cn/sysinternals/downloads/psexec


      2£©¹¥»÷Á÷³Ì


      Ä¿±ê»úÉÏ¿ªÆôÁËadmin$¹²Ïí£¬ÇÒ먦Æô·À»ðǽ£¬µ¼ÖÂÌø°å»ú¿ÉÒÔÓëÄ¿±ê»ú½¨Á¢ipc$Á¬½Ó£¬Í¬Ê±ÊͷŶþ½øÖÆÎļþpsexecsvc.exeµ½Ä¿±ê»úÖУ¬È»ºóÔÚÌø°å»úÉÏͨ¹ýÖ´ÐÐÔËÐÐPsExec£¬»áΪĿ±ê»úÔ¶³Ì´´½¨Ò»¸öPsExec·þÎñ²¢Æô¶¯£¬½ÓÏÂÀ´¹¥»÷ÕßÖ»ÐèÔÚÌø°å»úÉÏÀûÓÃPsExecµÄÔ¶³ÌÃüÁî¹¹ÔìÒ»¸ö½»»¥shell¼´¿ÉʵÏÖºáÏòÒÆ¶¯¡£


      3£©¹¥»÷¸´ÏÖ


      Ìø°å»ú£º192.168.20.35£¨Windows10£©

      Ä¿±ê»ú£º192.168.210.102£¨Windows 10£©


      Ê×Ïȹ¥»÷ÕßÔÚÌø°å»úÉϽ¨Á¢ÓëÄ¿±ê»úµÄIPCÁ¬½Ó¡£



      Æä´Î¹¥»÷ÕßʹÓÃPsExec.exe¹¤¾ß£¬ÏòÄ¿±ê»ú´«ËÍÔ¶³ÌÃüÁԶ³Ì´´½¨Ò»¸öPsExecµÄ·þÎñ£¬Ö´ÐÐÔ¶³ÌÖ¸Áî²¢»ØÏÔÊý¾Ý£©£¬ÆäÖÐ-accepteula²ÎÊýÊÇÒòΪµÚÒ»´ÎÖ´ÐÐPsExecʱ»áµ¯³öÈ·ÈÏ¿ò£¬¶øÊ¹ÓøòÎÊý¾Í¿ÉÒÔÔÚ¾²Ä¬Ä£Ê½ÏÂÔËÐжø²»»á±»·¢ÏÖ£¬-s²ÎÊýÊÇÒÔsystemȨÏÞÔËÐиýø³Ì£¬»ñµÃÒ»¸ösystemȨÏ޵Ľ»»¥Ê½shell£¬ÊµÏÖºáÏòÒÆ¶¯¡£


      Ö´ÐÐÃüÁPsExec.exe-accepteula \<Ä¿±ê»úIP> -s cmd.exe



      ÔÚʹÓÃPsExecÖ´ÐÐÔ¶³ÌÃüÁîʱ£¬»áÔÚÄ¿±ê»úÖд´½¨Ò»¸öеķþÎñ£¬ÈçÏÂͼ¡£ÔÚ½áÊø½»»¥ºó£¬PsExec·þÎñ»á×Ô¶¯É¾³ý£¬µ«ÊÇÔÚ´´½¨ÒÔ¼°É¾³ýʱ»á²úÉú´óÁ¿ÈÕÖ¾ÐÅÏ¢£¬ËùÒÔ¿ÉÒÔ»ùÓڴ˶Թ¥»÷Õß½øÐÐËÝÔ´¡£



      02¡¢ÀûÓÃWMI½øÐкáÏòÉøÍ¸


      1£©WMI¹¤¾ß½éÉÜ


      WMIÊÇ¡°Windows Management Instrumentation¡±µÄËõд£¬WMIÊÇ´ÓWindows98¿ªÊ¼£¬ÏµÍ³×Ô´øµÄһϵÁй¤¾ß¼¯¡£WMIÌṩÁË/nodeÑ¡Ï¿ÉÒÔͨ¹ý135¶Ë¿ÚÉϵÄRPC·þÎñ½øÐÐÔ¶³Ì·ÃÎÊ£¬»òÕßÖ´ÐÐÔ¶³ÌÃüÁî¡£


      ÓÉÓÚ¸Õ¸Õ½²¹ýµÄPsExecÔÚÄÚÍøÖдóɱËÄ·½ºó£¬ºÜ¶à»Æ½ð³Ç¹ÙÍø³§ÉÌ¿ªÊ¼½«PsExec¼ÓÈëÁ˺ÚÃûµ¥£¬ËùÒÔ¹¥»÷Õß±©Â¶µÄ¿ÉÄÜÐÔ¶¸È»Ôö¼Ó¡£µ«ÊǸù¾ÝÑо¿Çé¿öÀ´¿´£¬Windows²Ù×÷ϵͳĬÈϲ»»á½«WMIµÄ²Ù×÷¼Ç¼µ½ÈÕÖ¾µ±ÖУ¬¶øÇÒÒòΪ²ÉÓõÄÊÇÎÞÎļþ¹¥»÷£¬ËùÒÔµ¼ÖÂWMI¾ßÓм«¸ßµÄÒþ±ÎÐÔ¡£ÓÉ´Ë£¬Ô½À´Ô½¶àµÄAPT¿ªÊ¼Ê¹ÓÃWMI½øÐй¥»÷£¬ÀûÓÃWMI¿ÉÒÔ½øÐÐÐÅÏ¢ÊÕ¼¯¡¢Ì½²â¡¢·´²¡¶¾¡¢ÐéÄâ»ú¼ì²â¡¢ÃüÁîÖ´ÐС¢È¨Ï޳־û¯µÈ²Ù×÷¡£


      2£©¹¥»÷Á÷³Ì


      Ä¿±ê»úÉÏ¿ªÆôÁË135¶Ë¿ÚºÍ445¶Ë¿Ú£¬¹¥»÷Õß¿ÉÒÔÖ±½ÓÔÚÌø°å»úÉÏÀûÓÃWMIÃüÁԶ³ÌÖ´ÐÐÖ¸ÁÀýÈ翪ÆôÄ¿±ê»úµÄÔ¶³Ì×ÀÃæ·þÎñ¡¢»òÕß½áºÏipc+typeµÄ·½Ê½ÊµÏÖÃüÁî½»»¥£¨WMIÖ´ÐÐÔ¶³ÌÃüÁîû·¨»ØÏÔ£©¡¢»òÕßÀûÓÃWMIEXEC.py£¨Ç¿»¯°æWMI£©»ñµÃ½»»¥Ê½shell£¬ÊµÏÖºáÏòÒÆ¶¯¡£


      µ±È»ÔÚÕû¸ö¹¥»÷¹ý³ÌÖУ¬Èç¹û¹¥»÷ÕßÎÞ·¨Ö±½ÓÔÚÌø°å»úÉϲÙ×÷£¬ÔòÐèÒª½øÐÐÒ»ÏÂsocks´úÀí£¬½«¹¥»÷»úÉϵÄÁ÷Á¿×ª·¢µ½Ìø°å»úÉÏ£¬½ø¶ø´«´ïµ½Ä¿±ê»úÉÏ£¬¾ßÌåµÄ²Ù×÷¹ý³Ì¿ÉÒԲο¼Ç°¼¸ÆªÎÄÕ¡¶ÀûÓÃEarthWormʵÏÖÄÚÍø´©Í¸¡·¡£


      3£©¹¥»÷¸´ÏÖ


      ¹¥»÷»ú£º192.168.210.38£¨KaliLinux£©

      Ìø°å»ú£º192.168.20.35£¨Windows10£©

      Ä¿±ê»ú£º192.168.210.102£¨Windows 10£©


      ¹¥»÷ÕßÀûÓÃWMICÖ´ÐÐÔ¶³ÌÃüÁ²é¿´Ä¿±ê»úÉϵĽø³ÌÐÅÏ¢¡£

      wmic /node:<Ä¿±ê»úIP>/user: /password: process list brief



      ¹¥»÷ÕßÀûÓÃWMIC²¢½áºÏipc+typeÖ´ÐÐÔ¶³Ì½»»¥Ö¸Áî¡£¹¥»÷Õßͨ¹ýWMICÃüÁîÆô¶¯Ä¿±ê»úÉϵÄcmd³ÌÐò£¬Ö´ÐÐÃüÁî²¢½«½á¹û±£´æÔÚC: esult.txtÎļþÖУ¬È»ºóÀûÓÃtypeÃüÁî¶ÁȡĿ±ê»úÉÏresult.txtÎļþµÄÄÚÈÝ£¬ÊµÏÖ½»»¥¡£


      wmic /node:192.168.183.130/user:administrator /password:Liu78963 process call create "cmd.exe /c<ÃüÁî> > C: esult.txt"



      Type \192.168.210.102c$ esult.txt



      ¹¥»÷ÕßÀûÓÃwmiexec.py£¬Í¨¹ýÌύĿ±ê»úµÄÓû§Ãû¼°ÃÜÂ룬¼´¿ÉÖ±½Ó»ñµÃÒ»¸ö½»»¥Ê½shell£¬³É¹¦½øÐкáÏòÒÆ¶¯¡£Wmiexec.py½Å±¾ÊÇimpacket¹¤¾ß°üÖеÄÒ»¸ö¹¤¾ß£¬ÊÇÒ»¸öÇ¿»¯°æµÄwmic£¬Í¬Ê±»¹Ö§³Ösocks´úÀí¡£Ö´ÐÐÒÔÏÂÃüÁî¼´¿É£º

      Python wmiexec.py:@<Ä¿µÄIP>



      03ÀûÓùþÏ£´«µÝ¹¥»÷½øÐкáÏòÒÆ¶¯


      1£©¹¥»÷¼ò½é


      ¹þÏ£´«µÝ¹¥»÷Ò²³ÆÎªPTH£¨Pass The Hash£©£¬ÊÇÒ»ÖÖÔÚÄÚÍøÉøÍ¸ÖкÜÖØÒªµÄÒ»ÖÖºáÏòÒÆ¶¯·½·¨£¬Í¨¹ýPTH¹¥»÷Õß¿ÉÒÔÔÚ²»ÐèÒªÖªµÀÃ÷ÎÄÃÜÂëµÄÇé¿öÏ£¬ÀûÓÃNTLM HashºÍLM HASHÖ±½ÓµÇ¼Ŀ±ê»ú»òÕß·´µ¯Shell¡£¶øÇÒÐèҪעÒâµÄÊÇ£¬ÕâÀïµÄÄ¿±ê»úͨ³£ÊÇÓò¿Ø£¨DC£©¡£


      ÆäʵPTH¹¥»÷µÄ²úÉúÔ­Òò·Ç³£¼òµ¥£¬ÒòΪÔÚÓò»·¾³ÖУ¬Óò¹ÜÀíÔ±ÊÇ¿ÉÒÔÀûÓÃÓòÕ˺ŹÜÀíÿһ̨ÓòÄÚÖ÷»úµÄ£¬Èç¹û¹ÜÀíÔ±ÀûÓÃÓòÕ˺ŵǽÁËijһ̨Ö÷»ú£¬Ôò¸ÃÖ÷»úµÄlsass.exe¾Í»áÏñÍù³£Ò»Ñù£¬½«µÇ¼ÕßµÄÕ˺żÇ¼ÏÂÀ´£¨ÓйØlsass.exeµÄ½éÉÜ¿ÉÒÔ·­¿´¡¶»ñµÃÓòÄÚµ¥»úHashÃÜÂë·½·¨×ܽᡷ£©£¬µ«ÊÇÐèҪעÒâµÄÊÇÔÚWindows Server 2012 ÒÔǰ£¬lsass.exeÊÇ¿ÉÒԼǼÃ÷ÎÄÃÜÂëµÄ£¬¹¥»÷Õ߾Ͳ»ÐèҪͨ¹ýPTH½øÐÐÒÆ¶¯ÁË£¬Ö»ÓÐÔÚWin Server 2012ÒÔºóµÄ°æ±¾£¬lsass.exeÎÞ·¨»ñµÃÃ÷ÎÄÃÜÂ룬¹¥»÷Õß¿ÉÒÔÀûÓÃijЩÊֶΣ¬»ñµÃHash ÃÜÂ룬Èç¹ûÅöÇÉÕâ¾ÍÊÇÓò¹ÜÀíÔ±ËùʹÓõÄÃÜÂëhashµÄ»°£¬ÄÇô¹¥»÷Õ߾ͿÉÒÔÀûÓøÃHashαװ³ÉÓò¹ÜÀíÔ±µÇ½Óò¿Ø»òÕ߯äËûÖ÷»ú¡£


      2£©¹¥»÷¸´ÏÖ


      Ìø°å»ú£º192.168.154.10£¨Windows7£©

      Ä¿±ê»ú£º192.168.154.30£¨Windows2008 R2£©£¨Óò¿ØDOMORE.ME£©


      ¹¥»÷ÕßÀûÓÃMimikatz½øÐÐPTH¹¥»÷

      ¹¥»÷ÕßÔÚ¿ØÖÆÁËÓòÄÚÄ³Ì¨Ìø°å»úºó£¬´Ó¹¥»÷»úÉÏ´«Ò»¸öMimikatzµ½Ìø°å»úÉÏ£¬Í¨¹ýÖ´ÐÐÒÔÏÂÃüÁî¿ÉÒÔ»ñµÃ±¾»úÕ˺Å£¬Èç¹ûÓò¹ÜÀíÔ±Ôø¾­Ê¹ÓÃÓòÕ˺ŵǽ¹ýÕą̂»úÆ÷£¬Mimikatz¾Í¿ÉÒÔ»ñµÃÓòÕ˺ŵÄÃÜÂëHash£¬ÈçÏ£º



      ÔÚ»ñÈ¡ÃÜÂëHashÖ®ºó£¬Ö´ÐÐÒÔÏÂÃüÁ¾Í¿ÉÒÔ½«ÓòÕ˺ŵÄHashÃÜÂë´«µÝµ½Óò¿Øµ±ÖÐ

      sekurlsa::pth /user:<Óû§Ãû> /domain: /ntlm:<ÓòÕ˺ŵÄHashÖµ>


      ÀûÓô˷½·¨£¬²»½ö¿ÉÒԵǽÓò¿Ø£¬Ò²¿ÉÒԵǽÓòÄÚÆäËûÖ÷»ú£¬Èç¹ûÊäÈëµÄÊÇÓòÃûÔò»á´«µÝµ½Óò¿Øµ±ÖУ¬Èç¹ûÊäÈëµÄÊÇÓòÄÚ»úÆ÷Ö÷»úIPÔò»á´«µÝµ½ÏàÓ¦Ö÷»úÖС£


      Ö´ÐÐÍêÉÏÊöÃüÁîºó£¬»á»Øµ¯Ò»¸öshell£¬ÀûÓøÃshell¿ÉÒÔÎÞÐèÓû§ÃûºÍÃÜÂëÔ¶³Ì·ÃÎÊÓò¿Ø»òÆäËûÓòÄÚÖ÷»ú¡£



      04¡¢ÀûÓÃÆ±¾Ý´«µÝ¹¥»÷½øÐкáÏòÒÆ¶¯


      1£©¹¥»÷¼ò½é


      Ʊ¾Ý´«µÝ¹¥»÷Ò²³ÉΪPTT£¬Ö®Ç°ÎÒÃǽ²µÄPTHÊÇ»ùÓÚNTLMÈÏÖ¤µÄ£¬³ýÁËÕâÖÖÈÏÖ¤·½·¨Í⣬»¹ÓÐÒ»ÖÖÈÏÖ¤·½·¨ÊÇ»ùÓÚKerberosЭÒéµÄ£¬¶øPTT¾ÍÊÇ»ùÓÚKerberosЭÒé½øÐй¥»÷¡£³ýÁËЭÒ鲻ͬÍ⣬Á½ÖÖ¹¥»÷·½·¨»¹ÓÐÒ»¸ö²»Í¬µãÄǾÍÊÇËùÐèÄ¿±ê»úµÄȨÏÞ²»Í¬¡£ÔÚÉøÍ¸²âÊÔÖУ¬ÏëÒª³É¹¦½øÐÐPTH¹¥»÷£¬±ØÐë»ñµÃÄ¿±ê»úÆ÷µÄ¹ÜÀíȨÏÞ£¬¶øPTTÔò²»ÐèÒª¡£


      ¾ßÌ幨ÓÚKerberosµÄÈÏ֤ЭÒéÊÇÔõô¹¤×÷µÄ£¬Õâ¸öÎÒ»á·Åµ½ÏÂÒ»ÆÚµ¥¶À½²½â¡£¼òµ¥À´Ëµ£¬KerberosÌṩÁËÁ½¸öÖØÒªµÄ¶«Î÷£º»Æ½ðƱ¾Ý¡¢°×񿮱¾Ý£¬ÓÃÀ´Î¬³ÖÓû§¶ÔÓò¿ØµÄȨÏÞ¡£ÆäÖл¹ÓÐÐíÐí¶à¶àµÄÈÏÖ¤ÐÅÏ¢°éËæ×ÅÁ½¸öƱ¾ÝµÄ²úÉú£¬ÆäÖÐÓÐÒ»¸ö½Ð×öPAC£¨Privilege Attribute Certificate£©µÄ¶«Î÷£¬ÊÇÎÒÃÇ×ÅÖØÒª¹Ø×¢µÄ¶ÔÏó¡£


      PACÓÖ½ÐÌØÈ¨ÊôÐÔÖ¤Ê飬ÊÇÓÃÀ´ÑéÖ¤¿Í»§¶ËµÄ·ÃÎÊȨÏ޵ġ£ÆäÖÐÓиö¾­µäµÄ©¶´¾ÍÊÇÀûÓÃÁËËû£¬MS14-068£¬¸Ã©¶´ÔÊÐí¾­¹ýÉí·ÝÑéÖ¤µÄÓû§ÔÚÆäKerberosƱ֤£¨TGT£©ÖвåÈëÈÎÒâµÄPAC£¨±íʾËùÓÐÓû§È¨Ï޵Ľṹ£©¡£¸Ã©¶´Î»ÓÚkdcsvc.dllÓò¿ØÖÆÆ÷µÄÃÜÔ¿·Ö·¢ÖÐÐÄ(KDC)ÖС£ÆÕͨÓû§¿ÉÒÔͨ¹ý³ÊÏÖ¾ßÓиıäÁËPACµÄKerberos TGTÀ´»ñµÃƱ֤£¬½ø¶øÎ±ÔìÆ±¾Ý»ñµÃ¹ÜÀíԱȨÏÞ¡£


      2£©¹¥»÷¸´ÏÖ


      Ìø°å»ú£º192.168.154.20£¨WindowsServer 2008£©

      Ä¿±ê»ú£º192.168.154.30£¨WindowsServer 2012£©£¨Óò¿ØDOMORE.ME£©


      ¹¥»÷ÕßÔÚÌø°å»úÉÏ£¬²éѯ¸Ą̃»úÆ÷ÔÚÓòÄÚµÄSIDÖµ£¬whoami /all



      ¹¥»÷ÕßÀûÓÃMS14-068µÄEXP£¬Éú³É»ùÓÚ¸ÃSIDµÄƱ¾Ý£¬Ö´ÐÐÒÔÏÂÃüÁî

      ms14-068.exe -u Óò³ÉÔ±Ãû@ÓòÃû -s Óò³ÉÔ±sid -d Óò¿ØÖÆÆ÷ipµØÖ· -p Óò³ÉÔ±ÃÜÂë


      EXPµÄÏÂÔØÏîĿΪ£º

      https://github.com/abatchy17/WindowsExploits/tree/master/MS14-068



      ¿ÉÒÔ¿´µ½ËùÉú³ÉµÄƱ¾Ý£¬ºó׺Ϊccache



      ¹¥»÷ÕßÔÚÌø°å»úÉÏ´ò¿ªMimikatz£¬Ê×ÏÈÇå³þµ±Ç°»úÆ÷ÖÐËùÓÐÆ¾Ö¤£¬Èç¹ûÓÐÓò³ÉԱƾ֤»áÓ°ÏìÆ¾Ö¤Î±Ôì¡£Kerberos::purge



      Ö´ÐÐÒÔÏÂÃüÁ½«Æ±¾Ý×¢Èëµ½ÄÚ´æµ±ÖУº

      mimikatz # kerberos::ptc Ʊ¾ÝÎļþ



      ×¢Èë³É¹¦ºó£¬¿ÉÒÔÓëÓò¿ØÖ±½Ó½¨Á¢Ô¶³ÌÁ¬½Ó£¬Ö´ÐÐÃüÁîµÈ²Ù×÷£¬ÈçÏÂ


      Ãâ·ÑÊÔÓÃ
      ·þÎñÈÈÏß

      ÂíÉÏ×Éѯ

      400-811-3777

      »Øµ½¶¥²¿
      ¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿