> 文章列表 > TryHackMe-Year of the Owl(Windows渗透测试)

TryHackMe-Year of the Owl(Windows渗透测试)

TryHackMe-Year of the Owl(Windows渗透测试)

Year of the Owl

当迷宫在你面前,你迷失了方向时,有时跳墙思考是前进的方向。


端口扫描

循例 nmap

TryHackMe-Year of the Owl(Windows渗透测试)

SMB枚举

smbmap

TryHackMe-Year of the Owl(Windows渗透测试)

enum4linux也什么都没有

Web枚举

80端口

TryHackMe-Year of the Owl(Windows渗透测试)

gobuster扫到一堆403,并没有什么有用的信息

443端口与80端口一致

47001端口依然什么都没有

mysql

TryHackMe-Year of the Owl(Windows渗透测试)

UDP端口扫描

TryHackMe-Year of the Owl(Windows渗透测试)

什么都没有

看一眼wp,开了snmp,这时我才明白房间开头那句话的含义

SNMP枚举

使用onesixtyone爆破团体名

TryHackMe-Year of the Owl(Windows渗透测试)

snmp-check获取信息

TryHackMe-Year of the Owl(Windows渗透测试)

有这么些账户

TryHackMe-Year of the Owl(Windows渗透测试)

另外值得注意的是WinDefender的服务及其进程都开启了,这意味着我们可能要考虑到免杀

TryHackMe-Year of the Owl(Windows渗透测试)

立足

根据刚刚获得的用户名,拿去进行rdp爆破

TryHackMe-Year of the Owl(Windows渗透测试)

jareth的密码爆了出来,但无法登录rdp

psexec也是没有权限访问

TryHackMe-Year of the Owl(Windows渗透测试)

135端口也没开

winrm开了,用evil-winrm尝试

TryHackMe-Year of the Owl(Windows渗透测试)

user flag

TryHackMe-Year of the Owl(Windows渗透测试)

权限提升

由于有WinDefender的存在,这里传一个winPEAS的经过混淆obufscated的版本

TryHackMe-Year of the Owl(Windows渗透测试)

好吧,它仍然被杀了

TryHackMe-Year of the Owl(Windows渗透测试)
c:\\下隐藏目录

TryHackMe-Year of the Owl(Windows渗透测试)

TryHackMe-Year of the Owl(Windows渗透测试)

rid 1000里面有两个熟悉的文件 sam和system

TryHackMe-Year of the Owl(Windows渗透测试)

开启smbserver

TryHackMe-Year of the Owl(Windows渗透测试)

TryHackMe-Year of the Owl(Windows渗透测试)

copy到攻击机

TryHackMe-Year of the Owl(Windows渗透测试)

secretsdump提取ntlm hash

TryHackMe-Year of the Owl(Windows渗透测试)

pth进winrm

TryHackMe-Year of the Owl(Windows渗透测试)

admin flag

TryHackMe-Year of the Owl(Windows渗透测试)