Skip to content

rvrsh3ll/OSGiScanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OSGiScanner

OSGiScanner is a simple Python3 tool written to aid Penetration Testers in finding OSGi consoles.

OSGi consoles commonly have the default username and password combination of admin:admin.

Once a Tester has gained access to an OSGi console, they may be able to execute groovy script via the script console or deploy malicous bundle packages.

I've previously documented both attack types:

Leveraging Adobe Live Cycle

Shelling Apache Felix With Java Bundles

To find OSGi consoles, we simply search for the "/system/console" directory. The web request typically requires Basic auth and we can use the fingerprint 'WWW-Authenticate: Basic realm="OSGi Management Console"' to detect such a console.

On Shodan, you can may find these consoles inside your target range by using the basic auth fingerprint as a search term. alt text

Next, execute OSGi scanner against that host or range of hosts to discover more potential targets.

Example usage

Setup

python3 -m pip install -r requirements

Example using cidr and a custom outfile

python3 OSGiScanner.py --cidr 10.10.1.0/24 --port 80 --outfile myscan.log

Example using SSL

python3 OSGiScanner.py --cidr 10.10.1.0/24 --port 443

Example using SSL on different port

python3 OSGiScanner.py --cidr 10.10.1.0/24 --port 9443 --ssl

Example using a host list

python3 OSGiScanner.py --hostFile hostlist.txt --port 8080 --verbose

Example using a file of cidrs with username and password

python3 OSGiScanner.py --cidrFile cidrlist.txt --username admin --password admin --port 8080 --verbose

About

Scan for OSGi Consoles

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages