# 内网渗透练习 # 内网渗透练习 ## 172.20.1.5 入口站点:http://mashang.eicp.vip:26379/ ![image-20240420130227397](http://cdn.wutongliran.top/img/image-20240420130227397.png) 一个 Tomcat 界面,通过弱口令 tomcat/tomcat 进入后台,利用对应版本的后台 GetShell 漏洞: 1. 用 Godzilla 生成一个 jsp webshell ![image-20240420130736016](http://cdn.wutongliran.top/img/image-20240420130736016.png) 2. 将 1.jsp 压缩成 wzh.zip ,再将后缀重命名为 war 3. 在后台文件上传点上传包含 webshell 的 war 文件 ![image-20240420131029963](http://cdn.wutongliran.top/img/image-20240420131029963.png) 4. 因为 wzh.war 里包含 1.jsp ,所以通过 `/wzh/1.jsp` 找到后门地址,连接后门 ![image-20240420131300089](http://cdn.wutongliran.top/img/image-20240420131300089.png) 搭建隧道: ``` python neoreg.py generate -k 123123 #生成隧道马 python neoreg.py -k 123123 -u http://mashang.eicp.vip:26379/wzh2/tunnel.jsp #连接隧道马 ``` 上线 daybreak ![image-20240420140913284](http://cdn.wutongliran.top/img/image-20240420140913284.png) 探测内网主机 image-20240420141137158 ![image-20240420141250962](http://cdn.wutongliran.top/img/image-20240420141250962.png) ​ ## 172.20.1.2 访问80端口: ![image-20240420141440043](http://cdn.wutongliran.top/img/image-20240420141440043.png) dvwa靶场,把难度调到 low ,直接上传 webshell 但是要用蚁剑连接需要先设置socks5代理 ![image-20240420141804450](http://cdn.wutongliran.top/img/image-20240420141804450.png) ![image-20240420141536799](http://cdn.wutongliran.top/img/image-20240420141536799.png) 上线daybreak: 因为没法使用 curl 和 wget 命令,所以就手动上传一个马,赋予执行权限再执行 ![image-20240420141931039](http://cdn.wutongliran.top/img/image-20240420141931039.png) ​ ## 172.20.1.3 访问80端口: ![image-20240420142010830](http://cdn.wutongliran.top/img/image-20240420142010830.png) 告诉我们是thinkphp站点,直接上工具扫描,但是该工具没有设置 socks 代理的功能,只好用 Proxifier 来转发 设置代理服务器: image-20240420142220392 设置代理规则:(因为要使用的工具是用java写的,所以应用程序选择 java.exe) image-20240420142307977 代理配置后用工具扫到一个漏洞: ![image-20240420142425441](http://cdn.wutongliran.top/img/image-20240420142425441.png) 写入 webshell : ![image-20240420142646115](http://cdn.wutongliran.top/img/image-20240420142646115.png) 连接蚁剑 上线 daybreak ![image-20240420142934047](http://cdn.wutongliran.top/img/image-20240420142934047.png) ​ ## 172.20.1.1 访问80端口: ![image-20240420145020723](http://cdn.wutongliran.top/img/image-20240420145020723.png) http://172.20.1.1/post.php?p_id=1%22存在 sql 注入漏洞: ![image-20240420145141263](http://cdn.wutongliran.top/img/image-20240420145141263.png) 拿到账号密码 admin/Aa123456,登录进后台: ![image-20240420155800199](http://cdn.wutongliran.top/img/image-20240420155800199.png) 来到测试网络连通性的界面: ![image-20240420155849633](http://cdn.wutongliran.top/img/image-20240420155849633.png) 点击测试,无回显,抓包: ![image-20240420155947701](http://cdn.wutongliran.top/img/image-20240420155947701.png) cmd参数的值是 `ping` 经过 base64 编码和 url 编码后的值,推测后面还有一段命令,将 echo 编码后传给参数cmd,证实推测 ![image-20240420160252296](http://cdn.wutongliran.top/img/image-20240420160252296.png) 传入 `whoami;echo `: ![image-20240420160611245](http://cdn.wutongliran.top/img/image-20240420160611245.png) ​ ## 172.20.1.4 该主机开放 6339 端口,试着爆破 redis 密码 ![image-20240423155310787](http://cdn.wutongliran.top/img/image-20240423155310787.png) 得到密码 123456 用工具连接并写入木马:(用 Proxifier 代理) ![image-20240423160212557](http://cdn.wutongliran.top/img/image-20240423160212557.png) ```shell 切换目录到网站的根目录 config set dir /var/www/html/ 写入恶意代码到内存中 set x "\n\n\n\n\n\n" 在磁盘中生成木马文件 config set dbfilename shell.php 将内存之中的数据导出到磁盘文件 save ``` 连接 webshell: ![image-20240423160326413](http://cdn.wutongliran.top/img/image-20240423160326413.png) 上线 daybreak: ![image-20240423160428196](http://cdn.wutongliran.top/img/image-20240423160428196.png)