0x01 优秀项目
https://www.vipshare.com/【WorkWin】
https://www.netsupportmanager.com/zh-CN/【NetSupportManager】
https://github.com/quasar/Quasar
https://github.com/n1nj4sec/pupy
https://github.com/Cr4sh/MicroBackdoor
https://github.com/orangetw/tsh
https://github.com/yuanyuanxiang/SimpleRemoter
https://github.com/Cc28256/CcRemote
https://github.com/rapid7/metasploit-framework
https://github.com/BishopFox/sliver
https://github.com/HavocFramework/Havoc
https://github.com/HackerCalico/Magic_C2
https://github.com/Adaptix-Framework/AdaptixC2【类似Havoc,Client端C++ QT、Server端Golang、Beacon端C/C++】
0x02 Windows权限维持
1、启动文件夹
2、注册表
3、服务
4、任务计划
0x03 Linux权限维持
1、修改/etc/shadow中密码
2、写入ssh公钥
# 0x01 Windows下权限提升
01 优秀项目
https://github.com/Ascotbe/Kernelhub
https://github.com/SecWiki/windows-kernel-exploits
https://forum.butian.net/share/860
https://github.com/uknowsec/SweetPotato
https://github.com/zcgonvh/DCOMPotato/tree/master
https://forum.butian.net/share/860
# 0x02 Linux下权限提升
01 优秀项目
https://github.com/The-Z-Labs/linux-exploit-suggester
https://github.com/jondonas/linux-exploit-suggester-2
https://github.com/liamg/traitor
https://github.com/peass-ng/PEASS-ng/tree/master/linPEAS
https://gtfobins.github.io/
02 SUID提权
原理很简单自行DeepSeek,具体做法是,执行如下命令寻找具有SUID位的可执行文件
find / -perm -4000 -type f -exec ls -l {} \;
0x01 优秀项目
https://github.com/CodeSecurityTeam/frp
https://github.com/jpillora/chisel
https://github.com/zema1/suo5
https://github.com/L-codes/Neo-reGeorg
0x02 Tailscale
基于WireGuard的一次性Socks5代理,Socks5代理在建立的VPN隧道中,感觉还不错,暂未在实战中测试
项目地址:https://github.com/Yeeb1/SockTail
# 0x01 Windows下凭证窃取
01 优秀项目
https://github.com/gentilkiwi/mimikatz
https://github.com/StarfireLab/SharpWeb
https://dre4merp.github.io/2024/12/利用-seclogon-ppid-spoofing-实现-dump-lsass-内存/
https://vari-sh.github.io/posts/doppelganger/
# 0x02 Linux下凭证窃取
01 可以获取密文
1.1 读取/etc/shadow后,使用cmd5进行解密:
https://www.cmd5.com/
注意,在cmd5中先识别类型,再进行解密
1.2 若cmd5中不能解密,可尝试hashcat解密,使用如下网站识别加密类型:
https://www.tunnelsup.com/hash-analyzer/
https://hashcat.net/wiki/doku.php?id=example%20hashes
爆破使用如下字典:
https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
最后执行如下命令:
hashcat -m 3200 ./hash.txt ./rockyou.txt
02 无法获取密文
01、劫持ssh密码
# 0x03 软件凭据窃取
https://github.com/AlessandroZ/LaZagne
# 0x01 Windows下主机敏感信息收集
01 优秀项目
https://github.com/aleenzz/InjectSQLServer【ASPX网站数据库密码加密存储】
https://github.com/qwqdanchun/Pillager
https://github.com/lintstar/SharpHunter
https://github.com/GhostPack/Seatbelt
# 0x02 Linux下主机敏感信息收集
0x01 优秀项目
https://mp.weixin.qq.com/s/tqd9jJJv4bmzN6xVdpGDow
https://github.com/shmilylty/netspy
https://github.com/shadow1ng/fscan
https://github.com/lcvvvv/kscan
nltest
0x02 文件切割
通过webshell上传文件失败时,有时是因为文件过大,可尝试先分割,上传后再合并
md5sum f
split -b 3M --verbose f f_
cat f_aa f_ab f_ac > f
md5sum f
# 0x01 数据库攻击
01 优秀项目
https://github.com/SafeGroceryStore/MDUT
https://github.com/jas502n/oracleShell
https://github.com/RowTeam/SharpSQLTools
https://github.com/0x727/SqlKnife_0x727
https://github.com/quentinhardy/odat
https://github.com/quentinhardy/msdat
02 SQLServer攻击
SQLServer攻击参考 -> https://github.com/safe6Sec/PentestDB,备份见 -> 07-内网服务攻击/01-数据库攻击/SQLServer攻击.md
有一段时期,SQLServer下可通过SQLPS绕过杀软执行Powershell上线C2,现在应该不行了
# 0x02 命令执行
01 优秀项目
https://github.com/rootclay/WMIHACKER
# 0x01 域渗透
01 信息收集
域环境下常规打法:上传bloodbound客户端搜集域内信息,把结果回传本地后,利用kali的bloodbound服务端解析,分析域内的薄弱环节