• XSS.stack #1 – первый литературный журнал от юзеров форума

ProxyShell_Target

SouthCore

RAID-массив
Забанен
Регистрация
21.04.2023
Сообщения
83
Реакции
-3
Гарант сделки
3
Пожалуйста, обратите внимание, что пользователь заблокирован
Доброго вам времени суток, подскажите, либо научите, либо за %. Есть доступ к корпе UK, соотвественно отдает инфу и dropshell, но ASPX нужно знать и т.д., читанул тут новости про Иранскую группу, кто то может похвастать готовым решением?
 
I am not sure if you try to find the Iranian group here or an ASPX shell... (to be honest).
For the second one GitHub is full of solutions, for example:
https://github.com/xl7dev/WebShell/blob/master/Aspx/ASPX%20Shell.aspx

For the first one, sorry I cannot help... 😐
 
Proxyshell on high value targets is all but dead with the amount of exploitation that has been going on. However if you want to give it a try you can try the following:

Scan:
Bash:
sudo masscan -Pn -sS -iL ranges.txt --rate 12000 -p443 --open-only --excludefile block.txt | grep -Eo '[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+' > results.txt

Append port:
Bash:
sed -i 's/$/:443/' results.txt

Vuln scan discovered IP addresses:
Bash:
nuclei -l results.txt -t nuclei-templates/cves/2021/CVE-2021-34473.yaml -o proxyshell_vulns.txt

NSE scan discovered IP addresses:
Bash:
nmap --script http-vuln-exchange-proxyshell.nse -Pn -sS -p 443 -iL results.txt -oN proxyshell_vulns

CIDR ranges: https://lite.ip2location.com/ip-address-ranges-by-country
block.txt: https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2
NSE: https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse
Example of CIDR output from ip2location: ireland.txt
Exploit: https://github.com/Udyz/proxyshell-auto
Email download: https://github.com/Jumbo-WJB/Exchange_SSRF
 
Последнее редактирование:
Proxyshell on high value targets is all but dead with the amount of exploitation that has been going on. However if you want to give it a try you can try the following:

Scan:
Bash:
sudo masscan -Pn -sS -iL ranges.txt --rate 12000 -p443 --open-only --excludefile block.txt | grep -Eo '[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+' > results.txt

Append port:
Bash:
sed -i 's/$/:443/' results.txt

Vuln scan discovered IP addresses:
Bash:
nuclei -l results.txt -t nuclei-templates/cves/2021/CVE-2021-34473.yaml -o proxyshell_vulns.txt

NSE scan discovered IP addresses:
Bash:
nmap --script http-vuln-exchange-proxyshell.nse -Pn -sS -p 443 -iL results.txt -oN proxyshell_vulns

CIDR ranges: https://lite.ip2location.com/ip-address-ranges-by-country
block.txt: https://gist.github.com/ozuma/fb21ab0f7143579b1f2794f4af746fb2
NSE: https://github.com/GossiTheDog/scanning/blob/main/http-vuln-exchange-proxyshell.nse
Example of CIDR output from ip2location: ireland.txt
Exploit: https://github.com/Udyz/proxyshell-auto
Email download: https://github.com/Jumbo-WJB/Exchange_SSRF
Vulnerable proxyshell - Nuclei results: https://web.archive.org/web/20230515114941/https://pastebin.com/raw/sQa6pFRL
 
It hasn't been updated in two years, is it out of date?
большинство ипаков принадлежат крупным компаниям, не думаю что они менялись) конечно свежих ботов и кравлеров там нет
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх