Post

Windows Always靶机复盘

难度-Easy

Windows Always靶机复盘

网段扫描

1
2
3
4
5
6
7
8
9
10
root@LingMj:~/xxoo# arp-scan -l
Interface: eth0, type: EN10MB, MAC: 00:0c:29:fb:0f:16, IPv4: 192.168.137.194
Starting arp-scan 1.10.0 with 256 hosts (https://github.com/royhills/arp-scan)
192.168.137.1	3e:21:9c:12:bd:a3	(Unknown: locally administered)
192.168.137.97	3e:21:9c:12:bd:a3	(Unknown: locally administered)
192.168.137.202	a0:78:17:62:e5:0a	Apple, Inc.
192.168.137.167	62:2f:e8:e4:77:5d	(Unknown: locally administered)

9 packets received by filter, 0 packets dropped by kernel
Ending arp-scan 1.10.0: 256 hosts scanned in 2.036 seconds (125.74 hosts/sec). 4 responded

端口扫描

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
root@LingMj:~/xxoo# nmap -p- 192.168.137.97 
Starting Nmap 7.94SVN ( https://nmap.org ) at 2025-07-30 09:24 EDT
Nmap scan report for Always-PC.mshome.net (192.168.137.97)
Host is up (0.0062s latency).
Not shown: 65522 closed tcp ports (reset)
PORT      STATE SERVICE
21/tcp    open  ftp
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
3389/tcp  open  ms-wbt-server
5357/tcp  open  wsdapi
8080/tcp  open  http-proxy
49152/tcp open  unknown
49153/tcp open  unknown
49154/tcp open  unknown
49155/tcp open  unknown
49156/tcp open  unknown
49158/tcp open  unknown
MAC Address: 3E:21:9C:12:BD:A3 (Unknown)

Nmap done: 1 IP address (1 host up) scanned in 24.54 seconds

获取webshell

目测没有80,有8080需要找点用户爆破

picture 0
picture 1
picture 2
picture 3
picture 4
picture 5
picture 6

构建反弹shell

picture 7

试了密码得用ftpuser登录

picture 8
picture 9

没弹回来我很好奇

picture 10
picture 11

重新构造也弹不回来

picture 12

原来是我点错了点击左边右边是取消

提权

picture 13
picture 14

可以了利用msf进行漏洞库扫描

picture 15
picture 16
picture 17

是root权限可以去找flag了,结束了感觉还是有点难度刚开始windows

userflag:HMV{You_Found_Me!}

rootflag:HMV{White_Flag_Raised}

This post is licensed under CC BY 4.0 by the author.