0x01 Entering the Government External Network through the Prefectural Level

0 20
All the vulnerabilities mentioned in the article have been fixed, all sensitive...

All the vulnerabilities mentioned in the article have been fixed, all sensitive information has been masked, and the article is for the purpose of sharing experience only, please do not take it seriously. Unauthorized attacks are illegal acts!

Background: Invited to participate as an attack team in a certain defense exercise. One of the targets is to "take control of the xx approval system and the official website control rights of the target".

0x01 Entering the Government External Network through the Prefectural Level

0x01 Entering the Government External Network through the Prefectural Level

Target servers usually exist in physical strong isolation data centers, and given the special nature of the target unit in this case, the possibility of moving across network segments to touch the target is almost zero, so we focus the target on the government external network of the target unit.

(Sogou Encyclopedia: The government external network is logically isolated from the Internet, available for non-secret and only use. Data exchange centers are established at the prefectural level, which can convert some publicly available information to the Internet area for public review.)

Through the business of the target unit on the external network, no entry point was found, so we further expanded the scope, targeted the subordinate units of the target unit for penetration, and found that a comprehensive service platform has weak passwords.

1675154504_63d8d448c4a94c3c56202.png!small

Although the platform involved a large amount of business and has complete functions, it is not within our target, so we must try to get shell and then penetrate the internal network.

A upload point was quickly found, with no restrictions, and a webshell of aspx type was successfully uploaded to get shell.

1675154656_63d8d4e0d93c757db2c3a.png!small?1675154657580

1675154704_63d8d51024f76633df2db.png!small?1675154705245

After simple information collection, the following key information was obtained:

1. A dual network card host, one of which is connected to the government external network we want to enter.

1675155360_63d8d7a0e9e66ca9652a0.png!small?1675155361571

2. The host went out, and a socks5 reverse tunnel was successfully established to enter the government external network.

0x02 Getting a Target, Falling into a Dilemma

The assets of the government external network are numerous, with services of multiple units built on it. In order to quickly lock the network segment where the target unit is located, we scanned the 80 port to get the corresponding web title, and extracted the approximate network segment corresponding to each unit from it.

After locking the general network segment of the target, scanning for common ports and POCs was performed on the network segment. Through this scan, some progress was made:

1. The target entry was found, but it was just a web interface login entry, without any vulnerabilities such as weak passwords or command execution, and there was no clue.

1675156798_63d8dd3e2032fa668c729.png!small?1675156799242

2. A deserialization vulnerability in shiro was found on a certain platform.

你可能想看:
最后修改时间:
admin
上一篇 2025年03月25日 01:12
下一篇 2025年03月25日 01:34

评论已关闭