Additional Information | bryan@debdev:~/tools/clusterd$ ./clusterd.py
clusterd/0.1 - clustered attack toolkit
Supporting jboss, coldfusion, weblogic, tomcat
usage: ./clusterd.py [options]
optional arguments:
-h, --help show this help message and exit
Connection:
Options for configuring the connection
-i [ip address] Server address
-iL [file] Server list
-p [port] Server port
--proxy [proxy://server:port]
Connect through proxy [http|https]
--proxy-auth [username:password]
Proxy credentials
--timeout [seconds] Connection timeout [5s]
--random-agent Use a random User-Agent for requests
--ssl Force SSL
Remote Host:
Settings specific to the remote host
-a [jboss|coldfusion|weblogic|tomcat]
Hint at remote host service
-o [windows|linux] Hint at remote host OS
-v [version] Specific version to test
--usr-auth [username:password]
Login credentials for service
--fingerprint Fingerprint the remote system
--arch [x86|x64] Specify remote OS architecture
Deploy:
Deployment flags and settings
--deploy [file] Deploy to the discovered service
--deployer [deployer]
Specify a deployer to use
--invoke Invoke payload after deployment
-b [user] Brute force credentials for user [admin]
--wordlist [path] Wordlist for brute forcing passwords
jboss modules:
--jb-info Dump host information
--jb-list List deployed WARs
--jb-smb Obtain SMB hash
coldfusion modules:
--cf-info Dump host information
weblogic modules:
--wl-info Gather WebLogic info
--wl-list List deployed apps
--wl-smb Obtain SMB hash
tomcat modules:
--tc-info Gather Tomcat info
--tc-list List deployed WARs
--tc-smb Obtain SMB hash
Other:
Miscellaneous flags
--deploy-list List all available deployers
--aux-list List all available exploits
--gen-payload [host:port] for reverse connection
Generate a reverse shell payload
-d Enable debug output
-l Log output to file [$time$_log.log]
|
---|