AI prompts
base on OA漏洞利用工具 #### 介绍
集成漏洞系统包括:用友、泛微、蓝凌、万户、致远、通达、帆软、金蝶、金和、红帆、宏景、浪潮、普元、亿赛通、海康威视、飞企互联、大华DSS、jeecg-boot
集成memshell功能:用友NC、用友U8C、亿赛通、帆软channel、jeecgboot注入内存马。
目前集成385漏洞,包括nday、1day(未公开poc)
![image-20240223101114978](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/微信图片_20241010170514.png)
java环境
java version "1.8.0_121"
Java(TM) SE Runtime Environment (build 1.8.0_121-b13)
Java HotSpot(TM) 64-Bit Server VM (build 25.121-b13, mixed mode)
基于Apt-T00ls二次开发工具,I Wanna Get All 安全工具, 严禁一切未授权漏洞扫描攻击
使用工具或文章转发用于其他途径,请备注作者及工具地址来源。
使用工具前建议判断系统指纹框架,部分漏洞为接口探测存活判断是否成功,实际利用情况以执行情况为准
很多误报还需要完善,欢迎各位提issues
#### 更新
更新漏洞
帆软报表ReportServer漏洞
帆软报表channel hsql黑名单绕过内存马注入
![image-20240223101114978](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/微信图片_20241010170522.png)
jeecg-boot testconnection pgsql内存马注入
![image-20240223101114978](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/微信图片_20241010170525.png)
其他oa漏洞共37个
#### ATT模块
##### 示例1:
用友NC 漏洞检测 (选择OA类型 -- 选择漏洞 -- 输入URL -- 检测)
![image-20240223102241624](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223102241624.png)
用友NC 漏洞利用(选择OA类型 -- 选择漏洞 -- 输入URL -- 输入命令 -- 执行)
![image-20240223102353236](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223102353236.png)
用友NC 文件上传(选择OA类型 -- 选择漏洞 -- 输入URL -- 上传文件 -- 执行)
![image-20240223102904034](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223102904034.png)
#### MemShell模块
1. 支持冰蝎3.0、哥斯拉、蚁剑、suo5、cmdecho、neoReGeorg、自定义内存马
2. 支持输出源码、Base64、hex、gzip格式payload
3. 用友NC反序列化 集成接口反序列化(测试环境)
4. 用友U8C反序列化 集接口反序列化(测试环境)
5. 亿赛通XStream反序列化 集接口反序列化(测试环境)
6. 用友NC内存马支持bypass脏数据传入,默认为100字节
![image-20240223103147463](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223103147463.png)
##### 示例2:
(*ActionHandlerSevlet及其他接口均使用CC6NC链注入)
用友NC冰蝎内存马
![image-20240223105521102](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223105521102.png)
用友NC 哥斯拉内存马注入
![image-20240223105914972](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223105914972.png)
用友NC cmdEcho内存马注入
![image-20240223110035708](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223110035708.png)
用友NC 自定义内存马注入(使用蚁剑ClassByte字节码),输入类名、Base64编码字节码、脏数据(可选)
![image-20240223110851090](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223110851090.png)
其余功能均可实现,不做展示。
##### 示例3:
用友U8Cloud 冰蝎内存马注入(其余内存马均可实现注入)
![image-20240223111206672](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223111206672.png)
用友U8Cloud cmdEcho内存马注入
![image-20240223111318555](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223111318555.png)
##### 示例4:
冰蝎内存马payload 源码、base64 payload等生成展示(用友NC示例)
![image-20240223104122068](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223104122068.png)
![image-20240223104220406](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223104220406.png)
#### Sqlmap模块
根据提示输入内容执行,集成调用sqlmap
![image-20240223111623212](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223111623212.png)
##### 示例5:
泛微CheckServer-Sql注入,检测漏洞存在后,将payload字段下内容保存为req文件,使用sqlmap模块构造参数
![image-20240223130450098](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223130450098.png)
![image-20240223131531476](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223131531476.png)
#### Crypt模块
1. 各类OA加解密
2. 各类编码解码
3. Class类反编译、class字节码生成(base64格式、gzip-base64格式)
4. class反编译仅文件读取、base64格式(yv66)、gzip-base64格式(H4sI)可反编译
##### 示例6
用友NC数据库密码 加解密
![image-20240223134600563](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223134600563.png)
![image-20240223134621644](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223134621644.png)
##### 示例7
classbyte字节码解码(class文件导入加解码,base64字节码编码解码)
恶意类常用加解码方式: Base64-Gzip、Hex-Gzip等
![image-20240223134655226](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223134655226.png)
![image-20240223134750702](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223134750702.png)
#### TaskList模块
保留Apt-T00ls原有功能:杀软识别
##### 示例8
![image-20240223135223833](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223135223833.png)
#### Command Create模块
保留Apt-T00ls原有功能:常用命令创建
##### 示例9
![image-20240223135242674](https://github.com/R4gd0ll/I-Wanna-Get-All/blob/main/images/image-20240223135242674.png)
#### 其他
部分sql注入漏洞tamper脚本放入tamper路径下
#### 免责说明
本工具仅面向合法授权的企业安全建设行为,如您需要测试本工具的可用性,请自行搭建靶机环境。
在使用本工具进行检测时,您应确保该行为符合当地的法律法规,并且已经取得了足够的授权。请勿对非授权目标进行扫描。
如您在使用本工具的过程中存在任何非法行为,您需自行承担相应后果,本人将不承担任何法律及连带责任。
在安装并使用本工具前,请您务必审慎阅读、充分理解各条款内容,限制、免责条款或者其他涉及您重大权益的条款可能会以加粗、加下划线等形式提示您重点注意。 除非您已充分阅读、完全理解并接受本协议所有条款,否则,请您不要安装并使用本工具。您的使用行为或者您以其他任何明示或者默示方式表示接受本协议的,即视为您已阅读并同意本协议的约束
", Assign "at most 3 tags" to the expected json: {"id":"10336","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"