Code Monkey home page Code Monkey logo

xpost's Introduction

What it does

A post-exploitation tool tailored for high-value systems, designed to assist in real attack penetration, achieving more comprehensive, covert, and long-term post-exploitation information gathering, as well as lateral movement penetration.

User

Red team attack and defense personnel.

Application-oriented

email servers, gateway devices, documents, enterprise knowledge management and collaboration platforms, single sign-on platforms, defect tracking platforms, IT operations management software, domain management team building, code repository management, etc.

What the capabilitie

Including but not limited to:email retrieval, plaintext password recording, operations data acquisition, obtaining arbitrary login credentials under unknown passwords, domain controller information retrieval, single sign-on hijacking, and trace cleaning operations.

Advantages

The data callback traffic achieves traffic concealment stealth persistence, fileless landing after server rebooting or patch updates, the backdoor remains undetectable.

Currently Supported Applications

zimbra、confluence、zoho

Usage Methods and Scenarios

1.The tool relies on the Godzilla Webshell management tool, deployed in the form of plugins. Godzilla download link: https://github.com/BeichenDream/Godzilla

2.After successfully obtaining access to the target system, in most scenarios, permissions are gained through remote attacks exploiting vulnerabilities. It's also possible to gain access to target permissions through other means. Regardless of the method, we need an environment where code can be executed. We implant a memory-based webshell successfully into the memory and use the webshell as a loader to further execute functions (payloads) present in other tools in memory, obtaining the desired data and performing other operations. When the vulnerability itself supports code execution, such as the confluenceCVE-2023-22527 template injection vulnerability, we directly inject a memory-based webshell by optimizing the exploit. When the vulnerability type involves file upload or command execution, refer to the following methods for injecting a memory-based webshell.

Core Overview of Functional Implementation Technologies

The topic discussed the post-exploitation research on high-value systems such as email servers, gateway devices, documents, enterprise knowledge management and collaboration platforms, single sign-on platforms, defect tracking platforms, IT operations management software, domain management team building, code repository management, etc.Targeting various applications, it was achieved by deploying highly covert plugins and leveraging deprecated functionalities to hijack the runtime web container request processing logic and implant highly concealed persistent backdoors in memory. These memory-implanted backdoors serve as loaders to execute effective payloads directly in memory, with both the backdoor code logic and functional payloads operating within memory. In-depth analysis of the code logic for different applications led to the exploration of solutions for challenges encountered during the runtime execution of payloads in memory. These challenges included multiple class loader loading, bypassing system file verification protection, and context decoupling for functional code extraction, among other issues. The implementation enabled the execution of effective payloads in memory without initiating additional network requests to the target or writing files to disk. This allowed for the covert execution of payloads in memory under highly concealed attack scenarios, facilitating the extraction of high-value system information, such as email retrieval, plaintext password recording, operations data acquisition, obtaining arbitrary login credentials under unknown passwords, domain controller information retrieval, single sign-on hijacking, and trace cleaning operations. Subsequently, existing web shell management tools were utilized to encrypt and transmit data, achieving traffic-side concealment. This approach aims to achieve a more comprehensive, covert, and long-term post-exploitation information gathering and deep penetration in real-world attack scenarios.

Zimbra

1. Upload the 'injec.jsp' file to the target system's

upload directory : /opt/zimbra/jetty_base/webapps/zimbra/public/

2.Access 'inject.jsp' to inject a memory backdoor into the system. After injecting, delete 'inject.jsp,' but the backdoor will still persist.

图片

Successfully removed 'inject.jsp' and established a connection to the memory backdoor.

图片

3.Backdoor Persistence

Prevent the memory-resident backdoor from being cleared upon restart by replacing the zimbra-license.jar plugin. Substitute the malicious zimbra-license-success.jar for the original system jar file to achieve backdoor persistence.

图片

4.Clearing logs

Utilize the 'zimbraplugin ClearLog' function to erase logs of malicious JSP access.

图片

5.Functional payload

Utilize specific functionalities as needed. Upon clicking the corresponding function, the payload will be sent to the server backdoor, and the corresponding payload will be executed in memory.

图片

6.Traffic

图片

7.Test Version

9.0.0_GA_4583

Zoho

1.Upload shell.jar to inject a backdoor into the target system at runtime

图片

The backdoor has been successfully injected; delete shell.jar.

2.Backdoor Persistence

To prevent the loss of the backdoor upon system restart, modify the startup logic by replacing AdventnetADSMStartUp.jar.

3.Functional payload

图片

4.Traffic

图片

5.Test Version

ManageEngine_ADManager_Plus_7222_64

Confluence

1. Upload inject.jsp to inject a memory backdoor.

Upload path: /opt/atlassian/confluence/synchrony-proxy/

2.Access inject.jsp to inject a memory backdoor.

图片

After successfully injecting the backdoor, delete inject.jsp.

3.Functional payload

图片

4.Traffic

图片

5.Test Version

图片

xpost's People

Contributors

0linlin0 avatar

Stargazers

 avatar Sissel avatar dongxia avatar  avatar nu11 avatar Implex avatar  avatar  avatar xon1y avatar Yyy avatar 倾旋 avatar Aaditya Purani avatar hirak0 avatar  avatar CrE0m avatar huihai avatar  avatar  avatar K3zy avatar  avatar  avatar lu2ker avatar S1rius avatar  avatar  avatar QZ avatar FrenchPicnic avatar Wlk7 avatar  avatar  avatar 7a6163 avatar yzddmr6 avatar r00tuser avatar tt_tt avatar re.about avatar Lz1y avatar xrmr avatar fantasy avatar  avatar Mote avatar  avatar Valerian avatar c0urag1 avatar  avatar LSA avatar  avatar  avatar Bruise avatar z3r0yu avatar  avatar  avatar  avatar  avatar kevinoclam avatar yangbh avatar Li Ray avatar AirSkye avatar 浮萍 avatar EvilChen avatar  avatar Cytosine avatar TonghuaRoot(童话) avatar 0cat avatar  avatar  avatar 鸭王 avatar Shym avatar  avatar hony avatar k avatar SongShuA avatar TingFeng avatar  avatar  avatar  avatar  avatar  avatar Roc木木 avatar novy avatar  avatar Amine Elsassi avatar 双商负数国服最菜的屯bug的人形自走仓鼠 avatar Jas502n avatar 小晨曦 avatar 404 avatar  avatar 檐下月 avatar  avatar  avatar IZY avatar 2rpang avatar 4ra1n avatar kui avatar  avatar 1nv0k3r avatar niumoumou avatar nine99 avatar 无在无不在 avatar Weiho avatar  avatar

Watchers

 avatar  avatar

xpost's Issues

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.