Skip to content

Commit

Permalink
README added
Browse files Browse the repository at this point in the history
  • Loading branch information
roo7break committed Mar 3, 2016
0 parents commit e0bce97
Showing 1 changed file with 32 additions and 0 deletions.
32 changes: 32 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
# serialator
Python script to exploit CVE-2015-4852.

## Description
During a recent engagement, I found that Nessus was now actively exploiting vulnerabilities for confirmation. When I checked the associated nasl script I found that the payload was generic enough to be used on a standalone script. Hence, I collected the payloads from all the nasl scripts that were part of the same RCE vulnerability (but for separate applications) and wrapped them with Python magic.
Next time you see a vulnreable application, use this script.

## Changelog:
* Update 29/02/2016
** Initial commit. Ready for testing.

## Author
Nikhil Sreekumar (@roo7break)

## Target applications
* Websphere
* JBoss
* OpenNMS
* Symantec Endpoint Protection Manager

## Included scripts
* serialator.py - Main exploit script
* ICMPListener.py - To setup a ICMP listener using scapy. Used alongside serialator.py for testing if target is vulnerable or not.

## Code details
* Python3
No additional packages required

## What next
* Incorporate ysoserial.jar or its payload generation
* Threaded exploiter - Weapon of mass exploitation :D
* Automated testing

0 comments on commit e0bce97

Please sign in to comment.