Lz1y / jdwp-shellifier

修改利用方式为通过对Sleeping的线程发送单步执行事件,达成断点,从而可以直接获取上下文、执行命令,而不用等待断点被击中。

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

JDWP exploitation script

What is it ?

This exploitation script is meant to be used by pentesters against active JDWP service, in order to gain Remote Code Execution.

How does it work ?

Base on https://github.com/IOActive/jdwp-shellifier . Thanks for @hugsy

usage: poc.py [-h] -t IP [-p PORT] [-c COMMAND] poc.py: error: argument -t/--target is required

What is new ?

Added a new way to execute commands, learn from MSF exploit. In this way you can execute the command immediately instead of waiting for a breakpoint event.
demo

Useful link

https://docs.oracle.com/en/java/javase/11/docs/specs/jpda/architecture.html https://docs.oracle.com/en/java/javase/11/docs/specs/jpda/jpda.html https://docs.oracle.com/en/java/javase/11/docs/specs/jdwp/jdwp-spec.html https://docs.oracle.com/en/java/javase/11/docs/specs/jdwp/jdwp-protocol.html https://github.com/IOActive/jdwp-shellifier https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/java_jdwp_debugger.rb

About

修改利用方式为通过对Sleeping的线程发送单步执行事件,达成断点,从而可以直接获取上下文、执行命令,而不用等待断点被击中。

License:MIT License


Languages

Language:Python 100.0%