jenkens 的一个未授权访问的 漏洞 打点同时通道建立 windows nishang框架和msf 联动 直接getshell 使用windows个人token伪造提权
循例信息收集
1 2 3 4 5 6 7 8 9 10 11
# 简单信息收集查看开放端口 Scanned at 2024-05-06 13:41:27 BST for 19s Not shown: 997 filtered ports Reason: 997 no-responses PORT STATE SERVICE REASON 80/tcp open http syn-ack ttl 128 3389/tcp open ms-wbt-server syn-ack ttl 128 8080/tcp open http-proxy syn-ack ttl 128 MAC Address: 02:63:3A:F8:06:C9 (Unknown)
PORT STATE SERVICE VERSION 80/tcp filtered http 3389/tcp open tcpwrapped | ssl-cert: Subject: commonName=alfred | Not valid before: 2024-05-06T09:05:43 |_Not valid after: 2024-11-05T09:05:43 8080/tcp filtered http-proxy MAC Address: 02:25:99:23:A0:73 (Unknown)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: specialized|WAP|phone
Running: iPXE 1.X, Linux 2.4.X|2.6.X, Sony Ericsson embedded OS CPE: cpe:/o:ipxe:ipxe:1.0.0%2b cpe:/o:linux:linux_kernel:2.4.20 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:sonyericsson:u8i_vivaz OS details: iPXE 1.0.0+, Tomato 1.28 (Linux 2.4.20), Tomato firmware (Linux 2.6.22), Sony Ericsson U8i Vivaz mobile phone
Network Distance: 1 hop
TRACEROUTE HOP RTT ADDRESS 1 0.30 ms ip-10-10-140-74.eu-west-1.compute.internal (10.10.140.74)