ÉÏһƪÎÒÃǽéÉÜÁËÄÚÍøÉøÍ¸ÖкáÏòÒÆ¶¯µÄǰÁ½ÖÖ¹¥»÷·½·¨£ºÀûÓÃIPCºÍWindowsϵͳ·þÎñ¡£Í¨¹ýÒÔÉÏÁ½¸ö·½Ê½£¬ÎÒÃdzɹ¦µÄ½øÐÐÁ˼òµ¥µÄÄÚÍøºáÏòÒÆ¶¯¡£±¾ÆÚÎÒÃǽ«¼ÌÐø½éÉܺáÏòÒÆ¶¯µÄÆäÓà·½·¨£¬¶øÇÒÊǸü¼ÓÌù½üʵսµÄ·½Ê½£¬»°²»¶à˵£¬Ö±½Ó¿ªÊ¼£¡
01¡¢ÀûÓÃPsExec¹¤¾ß½øÐкáÏòÉøÍ¸
1£©PsExec¹¤¾ß½éÉÜ
PsExec ÊÇ windows Ï·dz£ºÃµÄÒ»¿îÔ¶³ÌÃüÁîÐй¤¾ß¡£PsExecµÄʹÓò»ÐèÒª¶Ô·½Ö÷»ú¿ª·½3389¶Ë¿Ú£¬Ö»ÐèÒª¶Ô·½¿ªÆôadmin$¹²Ïí (¸Ã¹²ÏíĬÈÏ¿ªÆô)¡£µ«ÊÇ£¬¼ÙÈçÄ¿±êÖ÷»ú¿ªÆôÁË·À»ðǽ£¬PsExecÒ²ÊDz»ÄÜʹÓõ쬻áÌáʾÕÒ²»µ½ÍøÂç·¾¶¡£ÓÉÓÚPsExecÊÇWindowsÌṩµÄ¹¤¾ß£¬ËùÒÔɱ¶¾Èí¼þ½«ÆäÁÐÔÚ°×Ãûµ¥ÖС£
¹¤¾ßÁ¬½Ó£º
https://docs.microsoft.com/zh-cn/sysinternals/downloads/psexec
2£©¹¥»÷Á÷³Ì
Ä¿±ê»úÉÏ¿ªÆôÁËadmin$¹²Ïí£¬ÇÒ먦Æô·À»ðǽ£¬µ¼ÖÂÌø°å»ú¿ÉÒÔÓëÄ¿±ê»ú½¨Á¢ipc$Á¬½Ó£¬Í¬Ê±ÊͷŶþ½øÖÆÎļþpsexecsvc.exeµ½Ä¿±ê»úÖУ¬È»ºóÔÚÌø°å»úÉÏͨ¹ýÖ´ÐÐÔËÐÐPsExec£¬»áΪĿ±ê»úÔ¶³Ì´´½¨Ò»¸öPsExec·þÎñ²¢Æô¶¯£¬½ÓÏÂÀ´¹¥»÷ÕßÖ»ÐèÔÚÌø°å»úÉÏÀûÓÃPsExecµÄÔ¶³ÌÃüÁî¹¹ÔìÒ»¸ö½»»¥shell¼´¿ÉʵÏÖºáÏòÒÆ¶¯¡£
3£©¹¥»÷¸´ÏÖ
Ìø°å»ú£º192.168.20.35£¨Windows10£©
Ä¿±ê»ú£º192.168.210.102£¨Windows 10£©
Ê×Ïȹ¥»÷ÕßÔÚÌø°å»úÉϽ¨Á¢ÓëÄ¿±ê»úµÄIPCÁ¬½Ó¡£

Æä´Î¹¥»÷ÕßʹÓÃPsExec.exe¹¤¾ß£¬ÏòÄ¿±ê»ú´«ËÍÔ¶³ÌÃüÁԶ³Ì´´½¨Ò»¸öPsExecµÄ·þÎñ£¬Ö´ÐÐÔ¶³ÌÖ¸Áî²¢»ØÏÔÊý¾Ý£©£¬ÆäÖÐ-accepteula²ÎÊýÊÇÒòΪµÚÒ»´ÎÖ´ÐÐPsExecʱ»áµ¯³öÈ·ÈÏ¿ò£¬¶øÊ¹ÓøòÎÊý¾Í¿ÉÒÔÔÚ¾²Ä¬Ä£Ê½ÏÂÔËÐжø²»»á±»·¢ÏÖ£¬-s²ÎÊýÊÇÒÔsystemȨÏÞÔËÐиýø³Ì£¬»ñµÃÒ»¸ösystemȨÏ޵Ľ»»¥Ê½shell£¬ÊµÏÖºáÏòÒÆ¶¯¡£
Ö´ÐÐÃüÁPsExec.exe-accepteula \<Ä¿±ê»úIP> -s cmd.exe

ÔÚʹÓÃPsExecÖ´ÐÐÔ¶³ÌÃüÁîʱ£¬»áÔÚÄ¿±ê»úÖд´½¨Ò»¸öеķþÎñ£¬ÈçÏÂͼ¡£ÔÚ½áÊø½»»¥ºó£¬PsExec·þÎñ»á×Ô¶¯É¾³ý£¬µ«ÊÇÔÚ´´½¨ÒÔ¼°É¾³ýʱ»á²úÉú´óÁ¿ÈÕÖ¾ÐÅÏ¢£¬ËùÒÔ¿ÉÒÔ»ùÓڴ˶Թ¥»÷Õß½øÐÐËÝÔ´¡£

02¡¢ÀûÓÃWMI½øÐкáÏòÉøÍ¸
1£©WMI¹¤¾ß½éÉÜ
WMIÊÇ¡°Windows Management Instrumentation¡±µÄËõд£¬WMIÊÇ´ÓWindows98¿ªÊ¼£¬ÏµÍ³×Ô´øµÄһϵÁй¤¾ß¼¯¡£WMIÌṩÁË/nodeÑ¡Ï¿ÉÒÔͨ¹ý135¶Ë¿ÚÉϵÄRPC·þÎñ½øÐÐÔ¶³Ì·ÃÎÊ£¬»òÕßÖ´ÐÐÔ¶³ÌÃüÁî¡£
ÓÉÓÚ¸Õ¸Õ½²¹ýµÄPsExecÔÚÄÚÍøÖдóɱËÄ·½ºó£¬ºÜ¶à»Æ½ð³Ç¹ÙÍø³§ÉÌ¿ªÊ¼½«PsExec¼ÓÈëÁ˺ÚÃûµ¥£¬ËùÒÔ¹¥»÷Õß±©Â¶µÄ¿ÉÄÜÐÔ¶¸È»Ôö¼Ó¡£µ«ÊǸù¾ÝÑо¿Çé¿öÀ´¿´£¬Windows²Ù×÷ϵͳĬÈϲ»»á½«WMIµÄ²Ù×÷¼Ç¼µ½ÈÕÖ¾µ±ÖУ¬¶øÇÒÒòΪ²ÉÓõÄÊÇÎÞÎļþ¹¥»÷£¬ËùÒÔµ¼ÖÂWMI¾ßÓм«¸ßµÄÒþ±ÎÐÔ¡£ÓÉ´Ë£¬Ô½À´Ô½¶àµÄAPT¿ªÊ¼Ê¹ÓÃWMI½øÐй¥»÷£¬ÀûÓÃWMI¿ÉÒÔ½øÐÐÐÅÏ¢ÊÕ¼¯¡¢Ì½²â¡¢·´²¡¶¾¡¢ÐéÄâ»ú¼ì²â¡¢ÃüÁîÖ´ÐС¢È¨Ï޳־û¯µÈ²Ù×÷¡£
2£©¹¥»÷Á÷³Ì
Ä¿±ê»úÉÏ¿ªÆôÁË135¶Ë¿ÚºÍ445¶Ë¿Ú£¬¹¥»÷Õß¿ÉÒÔÖ±½ÓÔÚÌø°å»úÉÏÀûÓÃWMIÃüÁԶ³ÌÖ´ÐÐÖ¸ÁÀýÈ翪ÆôÄ¿±ê»úµÄÔ¶³Ì×ÀÃæ·þÎñ¡¢»òÕß½áºÏipc+typeµÄ·½Ê½ÊµÏÖÃüÁî½»»¥£¨WMIÖ´ÐÐÔ¶³ÌÃüÁîû·¨»ØÏÔ£©¡¢»òÕßÀûÓÃWMIEXEC.py£¨Ç¿»¯°æWMI£©»ñµÃ½»»¥Ê½shell£¬ÊµÏÖºáÏòÒÆ¶¯¡£
µ±È»ÔÚÕû¸ö¹¥»÷¹ý³ÌÖУ¬Èç¹û¹¥»÷ÕßÎÞ·¨Ö±½ÓÔÚÌø°å»úÉϲÙ×÷£¬ÔòÐèÒª½øÐÐÒ»ÏÂsocks´úÀí£¬½«¹¥»÷»úÉϵÄÁ÷Á¿×ª·¢µ½Ìø°å»úÉÏ£¬½ø¶ø´«´ïµ½Ä¿±ê»úÉÏ£¬¾ßÌåµÄ²Ù×÷¹ý³Ì¿ÉÒԲο¼Ç°¼¸ÆªÎÄÕ¡¶ÀûÓÃEarthWormʵÏÖÄÚÍø´©Í¸¡·¡£
3£©¹¥»÷¸´ÏÖ
¹¥»÷»ú£º192.168.210.38£¨KaliLinux£©
Ìø°å»ú£º192.168.20.35£¨Windows10£©
Ä¿±ê»ú£º192.168.210.102£¨Windows 10£©
¹¥»÷ÕßÀûÓÃWMICÖ´ÐÐÔ¶³ÌÃüÁ²é¿´Ä¿±ê»úÉϵĽø³ÌÐÅÏ¢¡£
wmic /node:<Ä¿±ê»úIP>/user: /password: process list brief

¹¥»÷ÕßÀûÓÃWMIC²¢½áºÏipc+typeÖ´ÐÐÔ¶³Ì½»»¥Ö¸Áî¡£¹¥»÷Õßͨ¹ýWMICÃüÁîÆô¶¯Ä¿±ê»úÉϵÄcmd³ÌÐò£¬Ö´ÐÐÃüÁî²¢½«½á¹û±£´æÔÚC:
esult.txtÎļþÖУ¬È»ºóÀûÓÃtypeÃüÁî¶ÁȡĿ±ê»úÉÏresult.txtÎļþµÄÄÚÈÝ£¬ÊµÏÖ½»»¥¡£
wmic /node:192.168.183.130/user:administrator /password:Liu78963 process call create "cmd.exe /c<ÃüÁî> > C:
esult.txt"

Type \192.168.210.102c$
esult.txt

¹¥»÷ÕßÀûÓÃwmiexec.py£¬Í¨¹ýÌύĿ±ê»úµÄÓû§Ãû¼°ÃÜÂ룬¼´¿ÉÖ±½Ó»ñµÃÒ»¸ö½»»¥Ê½shell£¬³É¹¦½øÐкáÏòÒÆ¶¯¡£Wmiexec.py½Å±¾ÊÇimpacket¹¤¾ß°üÖеÄÒ»¸ö¹¤¾ß£¬ÊÇÒ»¸öÇ¿»¯°æµÄwmic£¬Í¬Ê±»¹Ö§³Ösocks´úÀí¡£Ö´ÐÐÒÔÏÂÃüÁî¼´¿É£º
Python wmiexec.py:@<Ä¿µÄIP>

03ÀûÓùþÏ£´«µÝ¹¥»÷½øÐкáÏòÒÆ¶¯
1£©¹¥»÷¼ò½é
¹þÏ£´«µÝ¹¥»÷Ò²³ÆÎªPTH£¨Pass The Hash£©£¬ÊÇÒ»ÖÖÔÚÄÚÍøÉøÍ¸ÖкÜÖØÒªµÄÒ»ÖÖºáÏòÒÆ¶¯·½·¨£¬Í¨¹ýPTH¹¥»÷Õß¿ÉÒÔÔÚ²»ÐèÒªÖªµÀÃ÷ÎÄÃÜÂëµÄÇé¿öÏ£¬ÀûÓÃNTLM HashºÍLM HASHÖ±½ÓµÇ¼Ŀ±ê»ú»òÕß·´µ¯Shell¡£¶øÇÒÐèҪעÒâµÄÊÇ£¬ÕâÀïµÄÄ¿±ê»úͨ³£ÊÇÓò¿Ø£¨DC£©¡£
ÆäʵPTH¹¥»÷µÄ²úÉúÔÒò·Ç³£¼òµ¥£¬ÒòΪÔÚÓò»·¾³ÖУ¬Óò¹ÜÀíÔ±ÊÇ¿ÉÒÔÀûÓÃÓòÕ˺ŹÜÀíÿһ̨ÓòÄÚÖ÷»úµÄ£¬Èç¹û¹ÜÀíÔ±ÀûÓÃÓòÕ˺ŵǽÁËijһ̨Ö÷»ú£¬Ôò¸ÃÖ÷»úµÄlsass.exe¾Í»áÏñÍù³£Ò»Ñù£¬½«µÇ¼ÕßµÄÕ˺żÇ¼ÏÂÀ´£¨ÓйØlsass.exeµÄ½éÉÜ¿ÉÒÔ·¿´¡¶»ñµÃÓòÄÚµ¥»úHashÃÜÂë·½·¨×ܽᡷ£©£¬µ«ÊÇÐèҪעÒâµÄÊÇÔÚWindows Server 2012 ÒÔǰ£¬lsass.exeÊÇ¿ÉÒԼǼÃ÷ÎÄÃÜÂëµÄ£¬¹¥»÷Õ߾Ͳ»ÐèҪͨ¹ýPTH½øÐÐÒÆ¶¯ÁË£¬Ö»ÓÐÔÚWin Server 2012ÒÔºóµÄ°æ±¾£¬lsass.exeÎÞ·¨»ñµÃÃ÷ÎÄÃÜÂ룬¹¥»÷Õß¿ÉÒÔÀûÓÃijЩÊֶΣ¬»ñµÃHash ÃÜÂ룬Èç¹ûÅöÇÉÕâ¾ÍÊÇÓò¹ÜÀíÔ±ËùʹÓõÄÃÜÂëhashµÄ»°£¬ÄÇô¹¥»÷Õ߾ͿÉÒÔÀûÓøÃHashαװ³ÉÓò¹ÜÀíÔ±µÇ½Óò¿Ø»òÕ߯äËûÖ÷»ú¡£
2£©¹¥»÷¸´ÏÖ
Ìø°å»ú£º192.168.154.10£¨Windows7£©
Ä¿±ê»ú£º192.168.154.30£¨Windows2008 R2£©£¨Óò¿ØDOMORE.ME£©
¹¥»÷ÕßÀûÓÃMimikatz½øÐÐPTH¹¥»÷
¹¥»÷ÕßÔÚ¿ØÖÆÁËÓòÄÚÄ³Ì¨Ìø°å»úºó£¬´Ó¹¥»÷»úÉÏ´«Ò»¸öMimikatzµ½Ìø°å»úÉÏ£¬Í¨¹ýÖ´ÐÐÒÔÏÂÃüÁî¿ÉÒÔ»ñµÃ±¾»úÕ˺ţ¬Èç¹ûÓò¹ÜÀíÔ±Ôø¾Ê¹ÓÃÓòÕ˺ŵǽ¹ýÕą̂»úÆ÷£¬Mimikatz¾Í¿ÉÒÔ»ñµÃÓòÕ˺ŵÄÃÜÂëHash£¬ÈçÏ£º

ÔÚ»ñÈ¡ÃÜÂëHashÖ®ºó£¬Ö´ÐÐÒÔÏÂÃüÁ¾Í¿ÉÒÔ½«ÓòÕ˺ŵÄHashÃÜÂë´«µÝµ½Óò¿Øµ±ÖÐ
sekurlsa::pth /user:<Óû§Ãû> /domain: /ntlm:<ÓòÕ˺ŵÄHashÖµ>
ÀûÓô˷½·¨£¬²»½ö¿ÉÒԵǽÓò¿Ø£¬Ò²¿ÉÒԵǽÓòÄÚÆäËûÖ÷»ú£¬Èç¹ûÊäÈëµÄÊÇÓòÃûÔò»á´«µÝµ½Óò¿Øµ±ÖУ¬Èç¹ûÊäÈëµÄÊÇÓòÄÚ»úÆ÷Ö÷»úIPÔò»á´«µÝµ½ÏàÓ¦Ö÷»úÖС£
Ö´ÐÐÍêÉÏÊöÃüÁîºó£¬»á»Øµ¯Ò»¸öshell£¬ÀûÓøÃshell¿ÉÒÔÎÞÐèÓû§ÃûºÍÃÜÂëÔ¶³Ì·ÃÎÊÓò¿Ø»òÆäËûÓòÄÚÖ÷»ú¡£

04¡¢ÀûÓÃÆ±¾Ý´«µÝ¹¥»÷½øÐкáÏòÒÆ¶¯
1£©¹¥»÷¼ò½é
Ʊ¾Ý´«µÝ¹¥»÷Ò²³ÉΪPTT£¬Ö®Ç°ÎÒÃǽ²µÄPTHÊÇ»ùÓÚNTLMÈÏÖ¤µÄ£¬³ýÁËÕâÖÖÈÏÖ¤·½·¨Í⣬»¹ÓÐÒ»ÖÖÈÏÖ¤·½·¨ÊÇ»ùÓÚKerberosÐÒéµÄ£¬¶øPTT¾ÍÊÇ»ùÓÚKerberosÐÒé½øÐй¥»÷¡£³ýÁËÐÒ鲻ͬÍ⣬Á½ÖÖ¹¥»÷·½·¨»¹ÓÐÒ»¸ö²»Í¬µãÄǾÍÊÇËùÐèÄ¿±ê»úµÄȨÏÞ²»Í¬¡£ÔÚÉøÍ¸²âÊÔÖУ¬ÏëÒª³É¹¦½øÐÐPTH¹¥»÷£¬±ØÐë»ñµÃÄ¿±ê»úÆ÷µÄ¹ÜÀíȨÏÞ£¬¶øPTTÔò²»ÐèÒª¡£
¾ßÌ幨ÓÚKerberosµÄÈÏÖ¤ÐÒéÊÇÔõô¹¤×÷µÄ£¬Õâ¸öÎÒ»á·Åµ½ÏÂÒ»ÆÚµ¥¶À½²½â¡£¼òµ¥À´Ëµ£¬KerberosÌṩÁËÁ½¸öÖØÒªµÄ¶«Î÷£º»Æ½ðƱ¾Ý¡¢°×񿮱¾Ý£¬ÓÃÀ´Î¬³ÖÓû§¶ÔÓò¿ØµÄȨÏÞ¡£ÆäÖл¹ÓÐÐíÐí¶à¶àµÄÈÏÖ¤ÐÅÏ¢°éËæ×ÅÁ½¸öƱ¾ÝµÄ²úÉú£¬ÆäÖÐÓÐÒ»¸ö½Ð×öPAC£¨Privilege Attribute Certificate£©µÄ¶«Î÷£¬ÊÇÎÒÃÇ×ÅÖØÒª¹Ø×¢µÄ¶ÔÏó¡£
PACÓÖ½ÐÌØÈ¨ÊôÐÔÖ¤Ê飬ÊÇÓÃÀ´ÑéÖ¤¿Í»§¶ËµÄ·ÃÎÊȨÏ޵ġ£ÆäÖÐÓиö¾µäµÄ©¶´¾ÍÊÇÀûÓÃÁËËû£¬MS14-068£¬¸Ã©¶´ÔÊÐí¾¹ýÉí·ÝÑéÖ¤µÄÓû§ÔÚÆäKerberosƱ֤£¨TGT£©ÖвåÈëÈÎÒâµÄPAC£¨±íʾËùÓÐÓû§È¨Ï޵Ľṹ£©¡£¸Ã©¶´Î»ÓÚkdcsvc.dllÓò¿ØÖÆÆ÷µÄÃÜÔ¿·Ö·¢ÖÐÐÄ(KDC)ÖС£ÆÕͨÓû§¿ÉÒÔͨ¹ý³ÊÏÖ¾ßÓиıäÁËPACµÄKerberos TGTÀ´»ñµÃƱ֤£¬½ø¶øÎ±ÔìÆ±¾Ý»ñµÃ¹ÜÀíԱȨÏÞ¡£
2£©¹¥»÷¸´ÏÖ
Ìø°å»ú£º192.168.154.20£¨WindowsServer 2008£©
Ä¿±ê»ú£º192.168.154.30£¨WindowsServer 2012£©£¨Óò¿ØDOMORE.ME£©
¹¥»÷ÕßÔÚÌø°å»úÉÏ£¬²éѯ¸Ą̃»úÆ÷ÔÚÓòÄÚµÄSIDÖµ£¬whoami /all

¹¥»÷ÕßÀûÓÃMS14-068µÄEXP£¬Éú³É»ùÓÚ¸ÃSIDµÄƱ¾Ý£¬Ö´ÐÐÒÔÏÂÃüÁî
ms14-068.exe -u Óò³ÉÔ±Ãû@ÓòÃû -s Óò³ÉÔ±sid -d Óò¿ØÖÆÆ÷ipµØÖ· -p Óò³ÉÔ±ÃÜÂë
EXPµÄÏÂÔØÏîĿΪ£º
https://github.com/abatchy17/WindowsExploits/tree/master/MS14-068

¿ÉÒÔ¿´µ½ËùÉú³ÉµÄƱ¾Ý£¬ºó׺Ϊccache

¹¥»÷ÕßÔÚÌø°å»úÉÏ´ò¿ªMimikatz£¬Ê×ÏÈÇå³þµ±Ç°»úÆ÷ÖÐËùÓÐÆ¾Ö¤£¬Èç¹ûÓÐÓò³ÉԱƾ֤»áÓ°ÏìÆ¾Ö¤Î±Ôì¡£Kerberos::purge

Ö´ÐÐÒÔÏÂÃüÁ½«Æ±¾Ý×¢Èëµ½ÄÚ´æµ±ÖУº
mimikatz # kerberos::ptc Ʊ¾ÝÎļþ

×¢Èë³É¹¦ºó£¬¿ÉÒÔÓëÓò¿ØÖ±½Ó½¨Á¢Ô¶³ÌÁ¬½Ó£¬Ö´ÐÐÃüÁîµÈ²Ù×÷£¬ÈçÏÂ
