红蓝对抗渗透测试 1

华盟原创文章投稿奖励计划

前言:

在团体渗透测试的项目中,如红蓝对抗,团队渗透测试比赛等,最重要的是过程与结果实时共享于团队,例如:A同学nmap目标站,B同学也nmap目标站,这在对抗比赛中是极其浪费时间也是非常容易引起防火墙,日志服务器或其他设备的警觉。所以打算写一系列关于未来团队渗透的对抗。争取做到过程与结果,团队实时共享。把曾经的团队作战经验形成一个适应对抗,比赛等的参考

红蓝对抗渗透测试 1

BloodHound简介:

BloodHound是2016年出现大家的视线中,它是一个分析和解读AD中权限关系的一个工具。对于攻击者来说,能快速的获取到域中的线索以便进行下一步攻击,而对于防御者来说,可以更快速的得知攻击者可能采取的攻击途径以及域中的可突破的途径。

项目地址:

https://github.com/BloodHoundAD/BloodHound

Debian上安装:

root@John:~# apt-get install git wget curl

root@John:~# wget -O - https://debian.neo4j.org/neotechnology.gpg.key |sudoapt-key add

root@John:~# echo 'deb http://debian.neo4j.org/repo stable/' | sudo tee

/etc/apt/sources.list.d/neo4j.list

root@John:~# apt-get install openjdk-8-jdk openjdk-8-jre

root@John:~# apt-get install neo4j

root@John:~

# echo "dbms.active_database=graph.db" >> /etc/neo4j/neo4j.conf

root@John:~# echo "dbms.connector.http.address=0.0.0.0:7474" >>

/etc/neo4j/neo4j.conf

root@John:~# echo "dbms.connector.bolt.address=0.0.0.0:7687" >>

/etc/neo4j/neo4j.conf

root@John:~# tail /etc/neo4j/neo4j.conf

# Name of the service

dbms.windows_service_name=neo4j

#********************************************************************

# Other Neo4j system properties

#********************************************************************

dbms.jvm.additional=-Dunsupported.dbms.udc.source=tarball

dbms.active_database=graph.db

dbms.connector.http.address=0.0.0.0:7474

dbms.connector.bolt.address=0.0.0.0:7687

root@John:~j# update-java-alternatives -l

java-1.8.0-openjdk-amd64       1081       /usr/lib/jvm/java-1.8.0-openjdk-amd64

root@John:~j# update-java-alternatives -s java-1.8.0-openjdk-amd64

下载地址:

https://neo4j.com/download/

root@John:~/Downloads# tar zxvf neo4j-community-3.3.0-unix.tar.gz

root@John:~/Downloads/neo4j-community-3.3.0/bin# ./neo4j startActive database: graph.db

Directories in use:

home:         /root/Downloads/neo4j-community-3.3.0

config:       /root/Downloads/neo4j-community-3.3.0/conf

logs:         /root/Downloads/neo4j-community-3.3.0/logs

plugins:      /root/Downloads/neo4j-community-3.3.0/plugins

import:       /root/Downloads/neo4j-community-3.3.0/import

data:         /root/Downloads/neo4j-community-3.3.0/data

certificates: /root/Downloads/neo4j-community-3.3.0/certificates

run:          /root/Downloads/neo4j-community-3.3.0/run

Starting Neo4j.

WARNING: Max 1024 open files allowed, minimum of 40000 recommended. See the Neo4j manual.

Started neo4j (pid 4286). It is available at http://localhost:7474/

There may be a short delay until the server is ready.

See /root/Downloads/neo4j-community-3.3.0/logs/neo4j.log for current status.

root@John:~# apt-get install bloodhound

红蓝对抗渗透测试 1

root@John:~/Downloads/neo4j-community-3.3.0/bin# nmap 127.0.0.1 -p 7474

Starting Nmap 7.40 ( https://nmap.org ) at 2017-12-02 11:16 EST

Nmap scan report for localhost (127.0.0.1)

Host is up (0.00011s latency).

PORT     STATE SERVICE

7474/tcp open  neo4j

Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds

红蓝对抗渗透测试 1

红蓝对抗渗透测试 1

文章来源:https://micropoor.blogspot.com

本文原创,作者:张,其版权均为华盟网所有。如需转载,请注明出处:https://www.77169.net/html/231784.html

发表评论