Tryhackme-Post-Exploitation Basics

Post-Exploitation Basics


使用工具:PowerView,Bloodhound,SharpHound,mimikatz,metasploit

Task1 Introduction

Deploy the Machine

Username: Administrator

Password: P@$$W0rd

Domain Name: CONTROLLER

Task2 Enumeration w/ Powerview

1.What is the shared folder that is not set by default?

Share

image-20210804103733870

2.What operating system is running inside of the network besides Windows Server 2019?

Windows 10 Enterprise Evaluation

image-20210804103807027

3.I’ve hidden a flag inside of the users find it

POST{P0W3RV13W_FTW}

image-20210804103831771

PoweView使用 https://github.com/BloodHoundAD/BloodHound/blob/master/Ingestors/SharpHound.ps1

powershell -ep bypass – 绕过powershell的执行策略,在cmd中运行powershell

. .\PowerView.ps1 – 启动PowerView

https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993 --查看具体powershell命令

Task3 Enumeration w/ Bloodhound

1.What service is also a domain admin

SQLSERVICE

image-20210804144352523

SharpHound.ps1 – https://github.com/BloodHoundAD/BloodHound/blob/master/Ingestors/SharpHound.ps1

. .\SharpHound.ps1

Invoke-Bloodhound -CollectionMethod All -Domain CONTROLLER.local -ZipFileName loot.zip

image-20210804142721726

2.What two users are Kerberoastable?

SQLSERVICE,KRBTGT

image-20210804144228399

Task4 Dumping hashes w/ mimikatz

1.what is the Machine1 Password?

password1

image-20210804145333366

2.What is the Machine2 Hash?

c39f2beb3d2ec06a62cb887fb391dee0

image-20210804145456342

Task5 Golden Ticket Attacks w/ mimikatz

1.I understand how a golden ticket attack works and how to use a golden ticket attack to move through a network

mimikatz - 金票攻击

lsadump::lsa /inject /name:用户名 – 导出用户的hash

image-20210804150556885

Kerberos::golden /user:** /domain:** /sid:** /用户名:NTLM /id:** – 创建黄金票据

image-20210804151725710

misc::cmd – 打开一个新的命令行,即可访问域内其他机器

image-20210804152215873

task6 Enumeration w/ Server Manager

1.What tool allows to view the event logs?

Event Viewer

2.What is the SQL Service password

MYpassword123#

Server Manager>Tools>Active Directory Users and Computers>CONTROLLER.local>Users

image-20210804152915666

Task7 Maintaining Access

1.I understand how to install a backdoor on a system using the persistence module

生成载荷

image-20210804164126863

连接服务器

image-20210804164215270

持久化连接

image-20210804164317515

Task8 Conclusion

1.I understand the basics of post-exploitation

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值