diff --git a/README.md b/README.md index 3de2402..4d7196b 100644 --- a/README.md +++ b/README.md @@ -6,6 +6,13 @@ > > Solve the high version of JDK Bypass, like FastJson, Jackson, Log4j2, native JNDI injection vulnerabilities, and detect locally available deserialization gadgets to achieve command execution, echo command execution, and memory shell injection +## Support + +- 本地gadget探测 +- 回显命令执行 +- Tomcat中间件注入冰蝎/哥斯拉流量加密Webshell内存马 +- Tomcat/Resin 一句话内存马 + ## Usage ```shell @@ -92,7 +99,7 @@ java -jar JNDI-Inject-Exploit-0.1-all.jar ip="192.168.0.104" url="http://192.168 ![](https://searchnull-image.oss-cn-shenzhen.aliyuncs.com/20211226142236.png) -**可利用Gadget信息,如名称中带有 `[TomcatEcho]` 等字样则表示该Gadget可利用且能够回显命令执行,如名称中带有 `BehinderFilter` 、`GodzillaFilter` 字样则表示支持注入冰蝎内存马或哥斯拉内存马** +**可利用Gadget信息,如名称中带有 `[TomcatEcho]` 等字样则表示该Gadget可利用且能够回显命令执行,如名称中带有 `TomcatBehinderFilter` 、`TomcatGodzillaFilter` 字样则表示支持在Tomcat中间件中注入冰蝎内存马或哥斯拉内存马(支持该功能不代表一定能够注入成功)** ![](https://searchnull-image.oss-cn-shenzhen.aliyuncs.com/20211226142317.png)