Edit

内网渗透

在渗透测试中,内网渗透是一个很重要的内容。常见的内网渗透方式有端口转发,路由, nat 方式。鉴于一次ctf失败的经历,整理内网渗透的常用方法。

0x1.实验环境

  • 攻击机,位于外网,ip 192.168.5.131/24
  • dmz区主机,已提权(linux 主机)双网卡 192.168.5.1/24 192.168.6.1/24
  • 内网主机 待提权 192.168.6.12

0x2. 路由方式

注: 本方式需要在攻击机和内网主机上分别加一条路由,在没有对内网主机提权时并不可采用,为了完整性整理出来。

  • 实现方式:
    1. dmz区打开ip_forward

      # echo 1 > /proc/sys/net/ipv4/ip_forward

    2. 攻击主机 添加路由

      # route add -net 192.168.6.0 netmask 255.255.255.0 gw 192.168.5.1

      注:此时并没有实现攻击机和内网主机的联通,因为建立连接的过程是双向的,攻击机的数据包内路由到内网靶机,而内网靶机的数据包却不能路由到外网主机。所以系统还不是连通的。(在此浪费了很长时间)

    3. 内网靶机 添加路由

      #route add -net 192.168.5.0 netmask 255.255.255.0 gw 192.168.6.1

至此可实现攻击机和内网主机的直接连通

0x3. nat 方式

将dmz主机做为nat路由器实现对内网的访问
  • 实现方式:
    1. dmz 区打开ip_forward

      # echo 1 > /proc/sys/net/ipv4/ip_forward

    2. dmz 区主机修改 iptables
      # iptabels -t nat -A POSTROUTING -j SNAT –to-source 192.168.6.1

    3. 攻击主机添加路由:
      # route add -net 192.168.6.0 netmask 255.255.255.0 gw 192.168.5.1

至此可实现攻击机对内网主机的单向连通
此方法的优点在于不需要修改内网靶机的路由表。

0x4 端口转发

此方法比较常用,也是我们在渗透测试中经常想到的。端口转发个人知道有两种方式。第一、metasploit 转发 第二、 ssh 转发
  • metasploit 转发
    实现方式:dmz区上传一个木马,用metepreter 连接,用 portforwd 命令来实现端口转发。另外metasploit 还有添加局部路由方式。
  • ssh 转发
    ssh 转发包括 本地端口转发,远程端口转发动态端口转发,具体可参考man手册

0x5 内网渗透hack

  • 端口转发与扫描: 将远端的某个端口转发到本地,本地用nmap -p 进行扫描本地端口
%23%u5185%u7F51%u6E17%u900F%0A@%28tech%29%5Bpublished%2C%20security%5D%0A%0A%u5728%u6E17%u900F%u6D4B%u8BD5%u4E2D%uFF0C%u5185%u7F51%u6E17%u900F%u662F%u4E00%u4E2A%u5F88%u91CD%u8981%u7684%u5185%u5BB9%u3002%u5E38%u89C1%u7684%u5185%u7F51%u6E17%u900F%u65B9%u5F0F%u6709%u7AEF%u53E3%u8F6C%u53D1%uFF0C%u8DEF%u7531%2C%20nat%20%u65B9%u5F0F%u3002%u9274%u4E8E%u4E00%u6B21ctf%u5931%u8D25%u7684%u7ECF%u5386%uFF0C%u6574%u7406%u5185%u7F51%u6E17%u900F%u7684%u5E38%u7528%u65B9%u6CD5%u3002%0A%0A%23%200x1.%u5B9E%u9A8C%u73AF%u5883%0A%0A+%20%u653B%u51FB%u673A%uFF0C%u4F4D%u4E8E%u5916%u7F51%uFF0Cip%20192.168.5.131/24%0A+%20dmz%u533A%u4E3B%u673A%uFF0C%u5DF2%u63D0%u6743%uFF08linux%20%u4E3B%u673A%uFF09%u53CC%u7F51%u5361%20192.168.5.1/24%20192.168.6.1/24%0A+%20%u5185%u7F51%u4E3B%u673A%20%20%u5F85%u63D0%u6743%20%20192.168.6.12%0A%0A%23%200x2.%20%u8DEF%u7531%u65B9%u5F0F%0A%0A%u6CE8%uFF1A%20%u672C%u65B9%u5F0F%u9700%u8981%u5728%u653B%u51FB%u673A%u548C%u5185%u7F51%u4E3B%u673A%u4E0A%u5206%u522B%u52A0%u4E00%u6761%u8DEF%u7531%uFF0C%u5728%u6CA1%u6709%u5BF9%u5185%u7F51%u4E3B%u673A%u63D0%u6743%u65F6%u5E76%u4E0D%u53EF%u91C7%u7528%uFF0C%u4E3A%u4E86%u5B8C%u6574%u6027%u6574%u7406%u51FA%u6765%u3002%0A%0A+%20%u5B9E%u73B0%u65B9%u5F0F%3A%0A%3E%201.%20dmz%u533A%u6253%u5F00ip_forward%0A%3E%09%09%0A%3E%09%09%23%20echo%201%20%3E%20/proc/sys/net/ipv4/ip_forward%0A%3E%0A%3E%202.%20%u653B%u51FB%u4E3B%u673A%20%u6DFB%u52A0%u8DEF%u7531%0A%3E%09%09%0A%3E%09%09%23%20route%20add%20-net%20192.168.6.0%20netmask%20255.255.255.0%20gw%20192.168.5.1%0A%3E%0A%3E%20%09%u6CE8%uFF1A%u6B64%u65F6%u5E76%u6CA1%u6709%u5B9E%u73B0%u653B%u51FB%u673A%u548C%u5185%u7F51%u4E3B%u673A%u7684%u8054%u901A%uFF0C%u56E0%u4E3A%u5EFA%u7ACB%u8FDE%u63A5%u7684%u8FC7%u7A0B%u662F%u53CC%u5411%u7684%uFF0C%u653B%u51FB%u673A%u7684%u6570%u636E%u5305%u5185%u8DEF%u7531%u5230%u5185%u7F51%u9776%u673A%uFF0C%u800C%u5185%u7F51%u9776%u673A%u7684%u6570%u636E%u5305%u5374%u4E0D%u80FD%u8DEF%u7531%u5230%u5916%u7F51%u4E3B%u673A%u3002%u6240%u4EE5%u7CFB%u7EDF%u8FD8%u4E0D%u662F%u8FDE%u901A%u7684%u3002%28%u5728%u6B64%u6D6A%u8D39%u4E86%u5F88%u957F%u65F6%u95F4%29%0A%3E%0A%3E%203.%20%u5185%u7F51%u9776%u673A%20%u6DFB%u52A0%u8DEF%u7531%0A%3E%0A%3E%09%09%23route%20add%20-net%20192.168.5.0%20netmask%20255.255.255.0%20gw%20192.168.6.1%0A%0A%0A%u81F3%u6B64%u53EF%u5B9E%u73B0%u653B%u51FB%u673A%u548C%u5185%u7F51%u4E3B%u673A%u7684%u76F4%u63A5%u8FDE%u901A%0A%0A%23%200x3.%20nat%20%u65B9%u5F0F%0A%0A%u5C06dmz%u4E3B%u673A%u505A%u4E3Anat%u8DEF%u7531%u5668%u5B9E%u73B0%u5BF9%u5185%u7F51%u7684%u8BBF%u95EE%0A%0A+%20%u5B9E%u73B0%u65B9%u5F0F%uFF1A%0A%3E%201.%20dmz%20%u533A%u6253%u5F00ip_forward%0A%3E%0A%3E%09%09%23%20echo%201%20%3E%20/proc/sys/net/ipv4/ip_forward%0A%3E%0A%3E%202.%20dmz%20%u533A%u4E3B%u673A%u4FEE%u6539%20iptables%0A%3E%09%09%23%20iptabels%20-t%20nat%20-A%20POSTROUTING%20-j%20SNAT%20--to-source%20192.168.6.1%0A%3E%0A%3E%203.%20%u653B%u51FB%u4E3B%u673A%u6DFB%u52A0%u8DEF%u7531%uFF1A%0A%3E%09%09%23%20route%20add%20-net%20192.168.6.0%20netmask%20255.255.255.0%20gw%20192.168.5.1%0A%3E%0A%0A%u81F3%u6B64%u53EF%u5B9E%u73B0%u653B%u51FB%u673A%u5BF9%u5185%u7F51%u4E3B%u673A%u7684%u5355%u5411%u8FDE%u901A%0A%u6B64%u65B9%u6CD5%u7684%u4F18%u70B9%u5728%u4E8E%u4E0D%u9700%u8981%u4FEE%u6539%u5185%u7F51%u9776%u673A%u7684%u8DEF%u7531%u8868%u3002%0A%0A%23%200x4%20%u7AEF%u53E3%u8F6C%u53D1%0A%u6B64%u65B9%u6CD5%u6BD4%u8F83%u5E38%u7528%uFF0C%u4E5F%u662F%u6211%u4EEC%u5728%u6E17%u900F%u6D4B%u8BD5%u4E2D%u7ECF%u5E38%u60F3%u5230%u7684%u3002%u7AEF%u53E3%u8F6C%u53D1%u4E2A%u4EBA%u77E5%u9053%u6709%u4E24%u79CD%u65B9%u5F0F%u3002%u7B2C%u4E00%u3001metasploit%20%u8F6C%u53D1%20%u7B2C%u4E8C%u3001%20ssh%20%u8F6C%u53D1%0A%0A+%20metasploit%20%u8F6C%u53D1%0A%3E%u5B9E%u73B0%u65B9%u5F0F%uFF1Admz%u533A%u4E0A%u4F20%u4E00%u4E2A%u6728%u9A6C%uFF0C%u7528metepreter%20%u8FDE%u63A5%uFF0C%u7528%20portforwd%20%u547D%u4EE4%u6765%u5B9E%u73B0%u7AEF%u53E3%u8F6C%u53D1%u3002%u53E6%u5916metasploit%20%u8FD8%u6709%u6DFB%u52A0%u5C40%u90E8%u8DEF%u7531%u65B9%u5F0F%u3002%0A+%20ssh%20%u8F6C%u53D1%0A%3E%20ssh%20%u8F6C%u53D1%u5305%u62EC%20%u672C%u5730%u7AEF%u53E3%u8F6C%u53D1%uFF0C%u8FDC%u7A0B%u7AEF%u53E3%u8F6C%u53D1%u52A8%u6001%u7AEF%u53E3%u8F6C%u53D1%uFF0C%u5177%u4F53%u53EF%u53C2%u8003man%u624B%u518C%0A%0A%0A%23%200x5%20%u5185%u7F51%u6E17%u900Fhack%0A+%20%u7AEF%u53E3%u8F6C%u53D1%u4E0E%u626B%u63CF%3A%20%u5C06%u8FDC%u7AEF%u7684%u67D0%u4E2A%u7AEF%u53E3%u8F6C%u53D1%u5230%u672C%u5730%uFF0C%u672C%u5730%u7528nmap%20-p%20%u8FDB%u884C%u626B%u63CF%u672C%u5730%u7AEF%u53E3%0A%0A%0A%0A