JNDI-Injection-Exploit-Plus
JNDI-Injection-Exploit-Plus copied to clipboard
80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background services by starting RMI server,LDAP server and HTTP server.
mvn clean package -DskipTests [ERROR] Failed to execute goal on project JNDI-Injection-Exploit-Plus: Could not resolve dependencies for project cckuailong:JNDI-Injection-Exploit-Plus:jar:1.7-SNAPSHOT: The following artifacts could not be resolved: com.oracle.weblogic:iiop-common:jar:1.0-SNAPSHOT, wlfullclient:wlfullclient:jar:1.0-SNAPSHOT, weblogic:spring:jar:1.0-SNAPSHOT, weblogic:logging:jar:1.0-SNAPSHOT,...
java -jar JNDI-Injection-Exploit-Plus-2.4-SNAPSHOT-all.jar -C "http://burpcolob" -D URLDNS Exception in thread "main" java.lang.reflect.InvocationTargetException at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:118) at java.base/java.lang.reflect.Method.invoke(Method.java:580) at jndi.CommonDeserial.execByDeserialize(CommonDeserial.java:25) at run.ServerStart.main(ServerStart.java:113) Caused by: java.lang.UnsupportedOperationException: The Security Manager is deprecated and will...
插件无法解析file参数  尝试过使用2.x或3.x的版本都无法构建,其中3.x的版本删除`default`后依旧无法构建,将${basedir}换位绝对路径依旧无法解析file参数 ``` install-weblogic1 clean ${basedir}\libs\wlfullclient.jar default wlfullclient wlfullclient 1.0-SNAPSHOT jar true install-file ``` 
hi. command execute on ataker machine (**weblogic10** gadjet), then generate payload...: ```java Exception in thread "main" java.lang.reflect.InvocationTargetException at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at jndi.CommonDeserial.execByDeserialize(CommonDeserial.java:25) at run.ServerStart.main(ServerStart.java:113)...