Skip to content

johnlodan/blind-rce

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Time Based / Blind Remote Code Execution (RCE)

A Python-based program for Time-based/Blind Remote Code Execution (RCE). The main objective of this program is to extract the data that is not visible and/or not returned in the response of vulnerable target. It uses time-based techniques by sending a payload to the target with a command specified and then waiting for its response.

DEMO

N|Solid


There are two ways to execute.

By Arguments:

python rce.py -t "https://www.site.com?vuln=" -c "whoami" -m "POST"

By File:

python rce.py -f "/locate/request.txt" -c "whoami"

/locate/request.txt

POST /vuln?x= HTTP/2
Host: site.com
Content-Length: 21
Sec-Ch-Ua-Platform: “Linux”
Accept-Language: en-US,en;q=0.9
Content-Type: application/json
Referer: https://site.com/vuln?x=
Accept-Encoding: gzip, deflate, br
Priority: u=0, i
{
product_id:“507f1f77bcf86cd799439011”,
category:“bar_foo”,
}

Request Header File. We can get it from our Burpsuite, Caido, Http Header or Tamper…


Customized headers and the data you want to pass in your request.

python rce.py -t http://site.com/vuln?x= -c "whoami" -m "POST" -d 10 --Headers "['X-Host: server.example.com', 'Authorization: Bearer eyJhbG']" --json "{product_id:'507f1f77bcf86cd799439011',category:'bar_foo'}"

POC

N|Solid


✨by: thejolotoproject ✨

License

MIT

About

[Pentesting] A Python-based program for Time-based/Blind Remote Code Execution (RCE). The main objective of this program is to extract the data that is not visible and/or not returned in the response of vulnerable target. It uses time-based techniques by sending a payload to the target with a command specified and then waiting for its response.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages