jdwp-inject
脚本使用类型:
portrule
脚本所属分类:
exploit, intrusive
脚本下载地址: http://nmap.org/svn/scripts/jdwp-inject.nse
Attempts to exploit java's remote debugging port. When remote debugging port is left open, it is possible to inject java bytecode and achieve remote code execution. This script allows injection of arbitrary class files.
After injection, class' run() method is executed. Method run() has no parameters, and is expected to return a string.
You can specify your own .class file to inject by filename
argument.
See nselib/data/jdwp-class/README for more.
Java .class
file to inject.
执行格式
nmap -sT <target> -p <port> --script=+jdwp-inject --script-args filename=HelloWorld.class
PORT STATE SERVICE REASON 2010/tcp open search syn-ack | jdwp-inject: |_ Hello world from the remote machine!
Author: Aleksandar Nikolic
License: VER007 整理 http://www.ver007.com