
拓扑图

导入虚拟机

网络配置
增加网卡

配置网卡



三台主机的密码均为1qaz@WSX,其中WEB在登录的时候需要切换用户de1ay登录
iP地址
DC

PC

配置PC和WEB主机时,会弹框输入administrator/1qaz@WSX

WEB

|-----|--------------|---------------|
| DC | 10.10.10.10 | |
| PC | 10.10.10.201 | 192.168.0.103 |
| WEB | 10.10.10.80 | 192.168.0.104 |
互通(关闭防火墙)



在WEB主机中启动靶场


外网渗透
攻击机IP

尝试网络互通情况

nmap扫描目标地址

扫问目标端口(靶场环境就不过多访问)


扫描目标7001端口目录

访问console/login/LoginForm.jsp
弱口令登录失败(非重点)
发现Weblogic Server版本:10.3.6.0

Weblogic常见漏洞
弱口令&&后台getshell
CVE-2020-14882/CVE-2020-14883
CVE-2017-10271
CVE-2017-3506
CVE-2019-2725
CVE-2018-2628
CVE-2018-2894
CVE-2014-4210
此靶场使用的CVE-2019-2725
注入蚁剑内存马

靶场开了360流量会被拦截,要过免杀,太菜索性关了360

连接内存马

内网渗透
启动Cobalt Strike服务端

客户端连接

创建监听器

生成木马并通过蚁剑上传



运行木马,上线CS

查看IP ipconfig

提权

抓取明文密码

扫描内网网段


查看详细信息,发现域

查询域用户

查询域管理员

查询域控主机

确认域控地址


使用psexec拿下DC和PC


