在线时间:8:00-16:00
迪恩网络APP
随时随地掌握行业动态
扫描二维码
关注迪恩网络微信公众号
开源软件名称:GrrrDog/Java-Deserialization-Cheat-Sheet开源软件地址:https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet开源编程语言:开源软件介绍:Java-Deserialization-Cheat-SheetA cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries. Please, use #javadeser hash tag for tweets. Table of content
Java Native Serialization (binary)OverviewMain talks & presentations & docsMarshalling PicklesExploiting Deserialization Vulnerabilities in JavaSerial Killer: Silently Pwning Your Java Endpointsby @pwntester & @cschneider4711 Deserialize My Shorts: Or How I Learned To Start Worrying and Hate Java Object DeserializationSurviving the Java serialization apocalypseby @cschneider4711 & @pwntester Java Deserialization Vulnerabilities - The Forgotten Bug ClassPwning Your Java Messaging With Deserialization VulnerabilitiesDefending against Java Deserialization VulnerabilitiesA Journey From JNDI/LDAP Manipulation To Remote Code Execution Dream Landby @pwntester and O. Mirosh Fixing the Java Serialization messby @e_rnst Blind Java Deserializationby deadcode.me An Overview of Deserialization Vulnerabilities in the Java Virtual Machine (JVM)by @joaomatosf Automated Discovery of Deserialization Gadget Chainsby @ianhaken An Far Sides Of Java Remote Protocolsby @_tint0 Payload generatorsysoserialhttps://github.com/frohoff/ysoserial ysoserial 0.6 payloads:
Plugins for Burp Suite (detection, ysoserial integration ): Full shell (pipes, redirects and other stuff):
How it works:
ysoserial fork with additional payloadshttps://github.com/wh1t3p1g/ysoserial
JRE8u20_RCE_Gadgethttps://github.com/pwntester/JRE8u20_RCE_Gadget Pure JRE 8 RCE Deserialization gadget ACEDcuphttps://github.com/GrrrDog/ACEDcup File uploading via:
Universal billion-laughs DoShttps://gist.github.com/coekie/a27cc406fc9f3dc7a70d Won't fix DoS via default Java classes (JRE) Universal Heap overflows DoS using Arrays and HashMapshttps://github.com/topolik/ois-dos/ How it works: Won't fix DoS using default Java classes (JRE) DoS against Serialization Filtering (JEP-290)Tool to search gadgets in sourceAdditional tools to test RMI:
Remote class detection:Exploitsno spec tool - You don't need a special tool (just Burp/ZAP + payload) RMI
JMX
JMXMP
JNDI/LDAP
https://github.com/zerothoughts/jndipoc https://github.com/welk1n/JNDI-Injection-Exploit JMSJSF ViewState
no spec tool vjdbc
no spec tool T3 of Oracle Weblogic
loubia (tested on 11g and 12c, supports t3s) JavaUnserializeExploits (doesn't work for all Weblogic versions) IIOP of Oracle Weblogic
Oracle Weblogic (1)
Oracle Weblogic (2)
IBM Websphere (1)
CoalfireLabs/java_deserialization_exploits IBM Websphere (2)
no spec tool IBM Websphere (3)
Metasploit IIOP of IBM Websphere
Red Hat JBoss (1)
https://github.com/njfox/Java-Deserialization-Exploit Red Hat JBoss 6.X
no spec tool Red Hat JBoss 4.x
no spec tool Jenkins (1)
Jenkins (2)
Jenkins (s)
CloudBees Jenkins
JetBrains TeamCity
Restlet
no spec tool RESTEasy
|
2023-10-27
2022-08-15
2022-08-17
2022-09-23
2022-08-13
请发表评论