Windows System Vulnerability claim

Source: Internet
Author: User
Tags administrator password

Suppose you've uploaded Webshell on the target server.



To view information about the target server:

User:

Network, Port:


Component:



Then execute the cmd command:



Click to execute:



From this you can know that the system Cmd.exe is not available, may be deleted or banned. We need to upload a cmd.exe, here to pay attention to the upload directory must be readable writable executable directory.

We upload a Cmd.exe directly to the root directory of the site




ASP file Upload function not available, server support ASPX, so we can use ASP Webshell to create a new ASPX Webshell file


When the new is complete, we visit this aspx Webshell file and click Execute cmd command. General ASPX permissions are relatively large, you can directly execute system cmd.

Because the command is executed in ASPX, the Web page dies, so use this webshell to upload a cmd.exe and return to the original Webshell to execute the command.




To see the system patches because you want to exploit the system vulnerabilities.





Found that there are a lot of system vulnerability patches are not installed. Then we can use the exploit tool of the loophole to attack according to the flaw number, here we use IIS6.exe to carry on the claim. First Use Aspxshell upload IIS6.exe.



Then execute IIS6.exe.


This step is also a claim to be successful, if you want to long-term control of the target host, it is necessary to continue to go down.

1. Modify Admin account password (undesirable will be found, and impact on target host, make admin unable to login)

2. Add an admin (undesirable, easy to find)

3. Read Admin account password (requires Administrator account not logged off)

4. Read Admin password hash

5. Trojan Planting, remote control

Here is a possible solution, the system users have a system help account, which is the system's own account is not easy to detect. We can elevate it to system permissions.




Read the administrator password to see if the administrator account is logged out.



The system administrator is running, then upload the tool and get the admin account password.



After obtaining the account password, connect 3389 ports.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.