Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

请问不是直接运行AntSwordFiltershell这个文件就可以了吗 #2

Open
CaiH123 opened this issue Apr 29, 2022 · 0 comments
Open

Comments

@CaiH123
Copy link

CaiH123 commented Apr 29, 2022

’‘’
现在就可以直接打了。先把org.chabug.memshell.InjectFilterShell打jar包

jar cvf tttt.jar org\chabug\memshell\InjectFilterShell.class
image-20200825105630712

然后把tttt.jar和AntSwordFilterShell.class写入目标。最后用CVE_2020_2883_URLClassLoader生成rememberMe Cookie打目标就行了。

URLClassLoader -> tttt.jar -> InjectFilterShell static -> defineClass byte -> AntSwordFilterShell
‘’‘
请问我还是需要这样的操作生成的内存马才有效吗,谢谢

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant