最近感到渗透水平的生疏,为了强化我的渗透水平和对漏洞的熟悉程度,现在抽空打一下域相关的靶机,强化回忆起相关的知识并且从中学习新的知识,增加渗透水平和经验,为后面考试做准备。(靶场就不发先知了,先知传图片太难受了,非常不方便)
Forest 靶机 ldap匿名访问,可以直接查询域内相关信息:
root㉿kali)-[/home/kali/Desktop] └─# nmap -v --script ldap-rootdse 10.10.10.161 -T5 Starting Nmap 7.94SVN ( https://nmap.org ) at 2024-09-10 09:12 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 09:12 Completed NSE at 09:12, 0.00s elapsed Initiating Ping Scan at 09:12 Scanning 10.10.10.161 [4 ports] Completed Ping Scan at 09:12, 0.18s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 09:12 Completed Parallel DNS resolution of 1 host. at 09:12, 0.01s elapsed Initiating SYN Stealth Scan at 09:12 Scanning 10.10.10.161 (10.10.10.161) [1000 ports] Discovered open port 53/tcp on 10.10.10.161 Discovered open port 445/tcp on 10.10.10.161 Discovered open port 139/tcp on 10.10.10.161 Discovered open port 135/tcp on 10.10.10.161 Discovered open port 593/tcp on 10.10.10.161 Discovered open port 3268/tcp on 10.10.10.161 Discovered open port 636/tcp on 10.10.10.161 Discovered open port 88/tcp on 10.10.10.161 Discovered open port 464/tcp on 10.10.10.161 Discovered open port 3269/tcp on 10.10.10.161 Warning: 10.10.10.161 giving up on port because retransmission cap hit (2). Discovered open port 389/tcp on 10.10.10.161 Completed SYN Stealth Scan at 09:12, 5.50s elapsed (1000 total ports) NSE: Script scanning 10.10.10.161. Initiating NSE at 09:12 Completed NSE at 09:12, 0.75s elapsed Nmap scan report for 10.10.10.161 (10.10.10.161) Host is up (0.20s latency). Not shown: 989 closed tcp ports (reset) PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap | ldap-rootdse: | LDAP Results | <ROOT> | currentTime: 20240910130839.0Z | subschemaSubentry: CN=Aggregate,CN=Schema,CN=Configuration,DC=htb,DC=local | dsServiceName: CN=NTDS Settings,CN=FOREST,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=htb,DC=local | namingContexts: DC=htb,DC=local | namingContexts: CN=Configuration,DC=htb,DC=local | namingContexts: CN=Schema,CN=Configuration,DC=htb,DC=local | namingContexts: DC=DomainDnsZones,DC=htb,DC=local | namingContexts: DC=ForestDnsZones,DC=htb,DC=local | defaultNamingContext: DC=htb,DC=local | schemaNamingContext: CN=Schema,CN=Configuration,DC=htb,DC=local | configurationNamingContext: CN=Configuration,DC=htb,DC=local | rootDomainNamingContext: DC=htb,DC=local | supportedControl: 1.2.840.113556.1.4.319 | supportedControl: 1.2.840.113556.1.4.801 | supportedControl: 1.2.840.113556.1.4.473 | supportedControl: 1.2.840.113556.1.4.528 | supportedControl: 1.2.840.113556.1.4.417 | supportedControl: 1.2.840.113556.1.4.619 | supportedControl: 1.2.840.113556.1.4.841 | supportedControl: 1.2.840.113556.1.4.529 | supportedControl: 1.2.840.113556.1.4.805 | supportedControl: 1.2.840.113556.1.4.521 | supportedControl: 1.2.840.113556.1.4.970 | supportedControl: 1.2.840.113556.1.4.1338 | supportedControl: 1.2.840.113556.1.4.474 | supportedControl: 1.2.840.113556.1.4.1339 | supportedControl: 1.2.840.113556.1.4.1340 | supportedControl: 1.2.840.113556.1.4.1413 | supportedControl: 2.16.840.1.113730.3.4.9 | supportedControl: 2.16.840.1.113730.3.4.10 | supportedControl: 1.2.840.113556.1.4.1504 | supportedControl: 1.2.840.113556.1.4.1852 | supportedControl: 1.2.840.113556.1.4.802 | supportedControl: 1.2.840.113556.1.4.1907 | supportedControl: 1.2.840.113556.1.4.1948 | supportedControl: 1.2.840.113556.1.4.1974 | supportedControl: 1.2.840.113556.1.4.1341 | supportedControl: 1.2.840.113556.1.4.2026 | supportedControl: 1.2.840.113556.1.4.2064 | supportedControl: 1.2.840.113556.1.4.2065 | supportedControl: 1.2.840.113556.1.4.2066 | supportedControl: 1.2.840.113556.1.4.2090 | supportedControl: 1.2.840.113556.1.4.2205 | supportedControl: 1.2.840.113556.1.4.2204 | supportedControl: 1.2.840.113556.1.4.2206 | supportedControl: 1.2.840.113556.1.4.2211 | supportedControl: 1.2.840.113556.1.4.2239 | supportedControl: 1.2.840.113556.1.4.2255 | supportedControl: 1.2.840.113556.1.4.2256 | supportedControl: 1.2.840.113556.1.4.2309 | supportedLDAPVersion: 3 | supportedLDAPVersion: 2 | supportedLDAPPolicies: MaxPoolThreads | supportedLDAPPolicies: MaxPercentDirSyncRequests | supportedLDAPPolicies: MaxDatagramRecv | supportedLDAPPolicies: MaxReceiveBuffer | supportedLDAPPolicies: InitRecvTimeout | supportedLDAPPolicies: MaxConnections | supportedLDAPPolicies: MaxConnIdleTime | supportedLDAPPolicies: MaxPageSize | supportedLDAPPolicies: MaxBatchReturnMessages | supportedLDAPPolicies: MaxQueryDuration | supportedLDAPPolicies: MaxDirSyncDuration | supportedLDAPPolicies: MaxTempTableSize | supportedLDAPPolicies: MaxResultSetSize | supportedLDAPPolicies: MinResultSets | supportedLDAPPolicies: MaxResultSetsPerConn | supportedLDAPPolicies: MaxNotificationPerConn | supportedLDAPPolicies: MaxValRange | supportedLDAPPolicies: MaxValRangeTransitive | supportedLDAPPolicies: ThreadMemoryLimit | supportedLDAPPolicies: SystemMemoryLimitPercent | highestCommittedUSN: 2479355 | supportedSASLMechanisms: GSSAPI | supportedSASLMechanisms: GSS-SPNEGO | supportedSASLMechanisms: EXTERNAL | supportedSASLMechanisms: DIGEST-MD5 | dnsHostName: FOREST.htb.local | ldapServiceName: htb.local:[email protected] | serverName: CN=FOREST,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=htb,DC=local | supportedCapabilities: 1.2.840.113556.1.4.800 | supportedCapabilities: 1.2.840.113556.1.4.1670 | supportedCapabilities: 1.2.840.113556.1.4.1791 | supportedCapabilities: 1.2.840.113556.1.4.1935 | supportedCapabilities: 1.2.840.113556.1.4.2080 | supportedCapabilities: 1.2.840.113556.1.4.2237 | isSynchronized: TRUE | isGlobalCatalogReady: TRUE | domainFunctionality: 7 | forestFunctionality: 7 |_ domainControllerFunctionality: 7 445/tcp open microsoft-ds 464/tcp open kpasswd5 593/tcp open http-rpc-epmap 636/tcp open ldapssl 3268/tcp open globalcatLDAP 3269/tcp open globalcatLDAPssl Service Info: Host: FOREST; OS: Windows NSE: Script Post-scanning. Initiating NSE at 09:12 Completed NSE at 09:12, 0.00s elapsed Read data files from: /usr/bin/../share/nmap Nmap done: 1 IP address (1 host up) scanned in 6.68 seconds Raw packets sent: 1362 (59.904KB) | Rcvd: 1311 (52.472KB) ldap导出相关信息:
...