免责声明
由于传播、利用本公众号夜组安全所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,公众号夜组安全及作者不为此承担任何责任,一旦造成后果请自行承担!如有侵权烦请告知,我们会立即删除并致歉。谢谢!
朋友们现在只对常读和星标的公众号才展示大图推送,建议大家把夜组安全“设为星标”,否则可能就看不到了啦!
域渗透
01
工具介绍
这是一个基于C#编写的面向Red Team的简易HTTP和WebDAV服务器,具有捕获Net-NTLM哈希的功能。它可以用于在受感染的计算机上提供载荷以进行横向移动。
需要.NET Framework 4.5以及System.Net和System.Net.Sockets环境。
02
工具使用
:: SharpWebServer ::a Red Team oriented C# Simple HTTP Server with Net-NTLMv1/2 hashes capture functionalityAuthors:- Can Güney Aksakalli (github.com/aksakalli) - original implementation- harrypatrick442 (github.com/harrypatrick442) - aksakalli's fork & changes- Dominic Chell () from MDSec - Net-NTLMv2 hashes capture code borrowed from Farmer- Mariusz Banach / mgeeky, <mb [at] binary-offensive.com> - combined all building blocks together,added connection keep-alive to NTLM AuthenticationUsage:SharpWebServer.exe <port=port> [dir=path] [verbose=true] [ntlm=true] [redir=true] [logfile=path]Options:port - TCP Port number on which to listen (1-65535)dir - Directory with files to be hosted.verbose - Turn verbose mode on.seconds - Specifies how long should the server be running. Default: indefinitelyntlm - Require NTLM Authentication before serving files. Useful to collect NetNTLM hashes(in MDSec's Farmer style)redir - Redirect after NTLM authentication based on redir paramerer in the url (e.g. ?redir=https://example.com)logfile - Path to output logfile.
C:> SharpWebServer.exe port=8888 dir=C:WindowsTemp verbose=true ntlm=true:: SharpWebServer ::a Red Team oriented C[.] Serving HTTP server on port : 8888[.] Will run for this long : 60 seconds[.] Verbose mode turned on.[.] NTLM mode turned on.[.] Serving files from directory : C:WindowsTempSharpWebServer [29.03.21, 17:55:14] NTLM: Sending 401 Unauthorized due to lack of Authorization header.SharpWebServer [29.03.21, 17:55:14] ::1 - "GET /test.txt" - len: 0 (401)SharpWebServer [29.03.21, 17:55:14] NTLM: Sending 401 Unauthorized with NTLM Challenge Response.SharpWebServer [29.03.21, 17:55:14] ::1 - "GET /test.txt" - len: 0 (401)[+] SharpWebServer: Net-NTLM hash captured:TestUser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 [29.03.21, 17:55:14] ::1 - "GET /test.txt" - len: 11 (200)
C:> curl -sD- http://localhost:8888/test.txt --ntlm --negotiate -u TestUser:TestPasswordHTTP/1.1 401 UnauthorizedTransfer-Encoding: chunkedWWW-Authenticate: NTLMDate: Mon, 29 Mar 2021 15:55:14 GMTHTTP/1.1 401 UnauthorizedTransfer-Encoding: chunkedWWW-Authenticate: NTLM TlRMTVNTUAACAAAABgAGADgAAAAFAomiESIzRFVmd4gAAAAAAAAAAIAAgAA+AAAABQLODgAAAA9TAE0AQgACAAYAUwBNAEIAAQAWAFMATQBCAC0AVABPAE8ATABLAEkAVAAEABIAcwBtAGIALgBsAG8AYwBhAGwAAwAoAHMAZQByAHYAZQByADIAMAAwADMALgBzAG0AYgAuAGwAbwBjAGEAbAAFABIAcwBtAGIALgBsAG8AYwBhAGwAAAAAAA==Date: Mon, 29 Mar 2021 15:55:14 GMTHTTP/1.1 200 OKContent-Length: 6Content-Type: text/plainDate: Mon, 29 Mar 2021 15:55:14 GMTfoobar
C:> dir \localhost@8888testVolume in drive \localhost@8888test has no label.Volume Serial Number is 0000-0000Directory of \localhost@8888test...30.03.2021 05:12 12 test3.txt30.03.2021 05:12 <DIR> test42 File(s) 23 bytes3 Dir(s) 225 268 776 960 bytes freeC:> type \[email protected]Hello world!C:> copy \[email protected] .1 file(s) copied.
03
工具下载
点击关注下方名片进入公众号
回复关键字【230714】获取下载链接
04
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……




还没有评论,来说两句吧...