漏洞效果:
将任意域用户提升到域管权限
Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2012Windows Server 2012 (Server Core installation)Windows Server 2012 R2Windows Server 2012 R2 (Server Core installation)Windows Server 2016Windows Server 2016 (Server Core installation)Windows Server 2019Windows Server 2019 (Server Core installation)Windows Server, version 1903 (Server Core installation)Windows Server, version 1909 (Server Core installation)Windows Server, version 2004 (Server Core installation)
准备工具:Impacket工具包:https://github.com/SecureAuthCorp/impacket.gitpoc:https://github.com/SecuraBV/CVE-2020-1472.gitexp:https://github.com/dirkjanm/CVE-2020-1472exp:https://github.com/risksense/zerologon
CVE-2021-42287&42278
Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2016 (Server Core installation)Windows Server 2016Windows Server, version 20H2 (Server Core Installation)Windows Server, version 2004 (Server Core installation)Windows Server 2022 (Server Core installation)Windows Server 2022Windows Server 2019 (Server Core installation)Windows Server 2019
https://github.com/WazeHell/sam-the-adminhttps://github.com/Ridter/noPac
Windows Server 2012 R2 (Server Core installation)Windows Server 2012 R2Windows Server 2012 (Server Core installation)Windows Server 2012Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2Windows RT 8.1Windows 8.1 for x64-based systemsWindows 8.1 for 32-bit systemsWindows 7 for x64-based Systems Service Pack 1Windows 7 for 32-bit Systems Service Pack 1Windows Server 2016 (Server Core installation)Windows Server 2016Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 1607 for 32-bit SystemsWindows 10 for x64-based SystemsWindows 10 for 32-bit SystemsWindows Server, version 20H2 (Server Core Installation)Windows 10 Version 20H2 for ARM64-based SystemsWindows 10 Version 20H2 for 32-bit SystemsWindows 10 Version 20H2 for x64-based SystemsWindows Server, version 2004 (Server Core installation)Windows 10 Version 2004 for x64-based SystemsWindows 10 Version 2004 for ARM64-based SystemsWindows 10 Version 2004 for 32-bit SystemsWindows 10 Version 21H1 for 32-bit SystemsWindows 10 Version 21H1 for ARM64-based SystemsWindows 10 Version 21H1 for x64-based SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows 10 Version 1909 for x64-based SystemsWindows 10 Version 1909 for 32-bit SystemsWindows Server 2019 (Server Core installation)Windows Server 2019Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 10 Version 1809 for 32-bit Systems
https://github.com/cube0x0/CVE-2021-1675https://github.com/cube0x0/impackethttps://github.com/3gstudent/Invoke-BuildAnonymousSMBServerhttps://bewhale.github.io/posts/29501.html
CVE-2019-1040
https://github.com/SecureAuthCorp/impackethttps://github.com/dirkjanm/krbrelayxhttps://github.com/Ridter/CVE-2019-1040https://github.com/Ridter/CVE-2019-1040-dcpwn同一网段内:https://www.freebuf.com/vuls/274091.html
ADCS漏洞--ESC8(PetitPotam)(ADCS relay)
Exchange相关,可控制Exchange服务器
Exchange Server 2010
Exchange Server 2013
Exchange Server 2016
也就是说【我们可以控制Exchange服务器向我们发起HTTP 协议的NTLM 请求,这样我们就能拿到Exchange机器用户的 Net-Ntlm Hash】
https://github.com/Ridter/Exchange2domainhttps://github.com/dirkjanm/privexchangehttps://github.com/SecureAuthCorp/impacket复现可以参考这篇文章:
https://www.jianshu.com/p/e081082cbc73CVE-2020-0688 (RCE)
https://github.com/zcgonvh/CVE-2020-0688https://github.com/random-robbie/cve-2020-0688复现:
https://github.com/Airboi/CVE-2020-17144-EXP攻击脚本2:
https://github.com/zcgonvh/CVE-2020-17144
CVE-2020-17144 <target> <user> <pass>CVE-2020-16875 (RCE)
https://srcincite.io/pocs/cve-2020-16875.py.txt复现:https://cloud.tencent.com/developer/article/1704777 CVE-2021-26855/CVE-2021-27065(getshell)(SSRF+任意文件写入)
利用CVE-2021-26855 SSRF漏洞枚举邮箱: (工具:https://github.com/charlottelatest/CVE-2021-26855) 因为我们通过nmap获取了域名。user.txt里面为我们加入的邮箱名字典 go run CVE-2021-26855.go -h 192.168.110.152 -U user.txt
https://github.com/hausec/ProxyLogon (一键利用)https://github.com/charlottelatest/CVE-2021-26855 (k)https://github.com/herwonowr/exprolog复现:
https://github.com/ktecv2000/ProxyShellhttps://github.com/Ridter/proxyshell_payloadhttps://github.com/dmaasland/proxyshell-poc复现:
CVE-2022-41028(RCE)
Microsoft Exchange Server 存在远程代码执行漏洞,经过身份验证的攻击者可利用此漏洞在目标系统上执行任意代码。
作者:HackingCost,文章转载于github