From 620228f1295135b090570e0ff546f4aa2aee6b81 Mon Sep 17 00:00:00 2001 From: SearchNull <43846937@qq.com> Date: Wed, 29 Dec 2021 11:05:54 +0800 Subject: [PATCH] Update README.md --- README.md | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) diff --git a/README.md b/README.md index 3de2402..968257e 100644 --- a/README.md +++ b/README.md @@ -6,6 +6,21 @@ > > Solve the high version of JDK Bypass, like FastJson, Jackson, Log4j2, native JNDI injection vulnerabilities, and detect locally available deserialization gadgets to achieve command execution, echo command execution, and memory shell injection +## ChangeLog + +**v0.2 Version** + +- 修复已知bug +- 支持从文件中读取HTTP请求 + +*** + +**v0.1 Version** + +- Gadget探测 +- 回显命令执行 +- 内存马注入 + ## Usage ```shell @@ -82,6 +97,14 @@ EnableHttpLog=False ## Example +**文件内容** + +![](https://searchnull-image.oss-cn-shenzhen.aliyuncs.com/20211229105716.png) + +**从文件中读取HTTP请求进行漏洞利用** + +![](https://searchnull-image.oss-cn-shenzhen.aliyuncs.com/20211229104932.png) + **LDAP查询的对象名称可为任意字符(示例为EvilObject),LDAPServer拦截客户端搜索结果获取查询名称,并根据该名称返回结果,因此查询任何名称均可运行。** ```