After uploading the Webshell, our goal is to get the server's system administrator privileges, which is the ultimate goal of hacking.
"H4ck Door" is a very big horse, provides a lot of features, I prefer to execute the cmd command to raise power.
First execute the "net user" command to see which users are on the server, and if the command cannot be executed, tick the "Wscript.Shell" next to it.
650) this.width=650; "title=" 1.jpg "alt=" wkiom1q3c5nr3cboaaczs8gycu8397.jpg "src=" http://s3.51cto.com/wyfs02/M00/ 4c/1a/wkiom1q3c5nr3cboaaczs8gycu8397.jpg "/>
Then create a user named Test and add him to the Administrators group.
650) this.width=650; "title=" 2.jpg "alt=" wkiol1q3c9yqftg-aabyuyd-das550.jpg "src=" http://s3.51cto.com/wyfs02/M00/ 4c/1c/wkiol1q3c9yqftg-aabyuyd-das550.jpg "/>
650) this.width=650; "title=" 3.jpg "alt=" wkiom1q3c6_bcjybaabup53hlo0945.jpg "src=" http://s3.51cto.com/wyfs02/M00/ 4c/1a/wkiom1q3c6_bcjybaabup53hlo0945.jpg "/>
To see if the system has 3389 ports open,
650) this.width=650; "title=" 4.jpg "alt=" wkiol1q3c_dxfbzzaahkesvgywy441.jpg "src=" http://s3.51cto.com/wyfs02/M01/ 4c/1c/wkiol1q3c_dxfbzzaahkesvgywy441.jpg "/>
You can see that 3389 is not open, then we will try to open this port, this operation is a bit troublesome. After some groping, found in fact only with one command can open 3389: "Echo y | REG ADD "hkey_local_machine\system\currentcontrolset\control\terminal Server"/V fdenytsconnections/t reg_dword/d 0 "
650) this.width=650; "title=" 5.jpg "alt=" wkiol1q3c_vwhauvaacsg-zoudu533.jpg "src=" http://s3.51cto.com/wyfs02/M01/ 4c/1c/wkiol1q3c_vwhauvaacsg-zoudu533.jpg "/>
Execute the "Netstat–an" command again and discover that port 3389 has been opened:
650) this.width=650; "title=" 6.jpg "alt=" wkiom1q3c9kwu0mpaagybbse8kq745.jpg "src=" http://s3.51cto.com/wyfs02/M01/ 4c/1a/wkiom1q3c9kwu0mpaagybbse8kq745.jpg "/>
Then you can log in remotely using the test account you created earlier, and this server becomes our "broiler".
If the broiler is in the intranet, you can use LCX for port forwarding, which can refer to the previous post http://yttitan.blog.51cto.com/70821/1560228.
If the test account created by us is too glaring, you can create a administrator shadow account, which is more subtle. How to create a shadow account can refer to the previous post http://yttitan.blog.51cto.com/70821/1334643.
If not, you can also hack the server administrator's password. First use the software saminside to read the password hash value on the server, and then use LC5 to crack. See blog http://yttitan.blog.51cto.com/70821/1337238 and http://yttitan.blog.51cto.com/70821/1336496 for specific operations.
This article from "a pot of turbid wine" blog, reproduced please contact the author!
Internet Security Series Seven website right