View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0003694 | Kali Linux | Queued Tool Addition | public | 2016-10-25 22:17 | 2022-05-31 07:18 |
Reporter | unix-ninja | Assigned To | sbrun | ||
Priority | normal | Severity | minor | Reproducibility | N/A |
Status | resolved | Resolution | fixed | ||
Fixed in Version | 2022.3 | ||||
Summary | 0003694: shellfire - exploiting LFI,RFI, and command injection vulnerabilities | ||||
Description | I recently open sourced a tool I developed during OSCP labs: shellfire. The tool is used for exploiting LFI,RFI, and command injection vulnerabilities in web sites. It is written in python (to be portable and easy to modify), and contains a wealth of features, including support for SSL/TLS, cookies, POST method, connection upgrade to reverse shell on Linux systems, and an embedded web server to host exploits for RFI. The purpose of this tool was to create an easy to use alternative to some of the more complex options. This tool is released with a BSD license to make it super flexible to use. Source code is available on github: https://github.com/unix-ninja/shellfire | ||||
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):
|
|
[Name] [Version] [Git commit] [Download] [Author] [Licence] [Description] [Dependencies] [Similar tools] [How to install] Alternatively, you can just call it using the interpreter directly: [How to use] At any time, you can type ".help" to get information on the internal commands available. Before exploitation, you need to set the target URL to exploit. Provide shellfire with the exploitable URL, but replace the injection point with "%CMD%". For instance: Now you can just run commands as if you had local access:
For Linux machines, shellfire also attempts to automate the process of opening a reverse shell and listener using the ".shell" internal command. After setting the target, do something like the following to open a reverse shell to your machine on port 4444 (192.168.1.10 in this example):
shellfire provides several additional internal commands which include setting the HTTP method, setting cookies, changing the UserAgent provided to the remote, setting HTTP auth credentials for password protected pages, automating phpinfo exploitation, etc... |
|
Could you git tag it's release for v0.4? |
|
Sorry about that. I have just tagged release 0.4 on github. You should be able to see that now. |
|
@kali-team, please could this be packaged up. |
|
Hey @g0tmi1k, sorry for the delay. With cornoavirus it got a bit crazy over here. I managed to get some time in the past day to look at your documentation. I think I got this right (it builds a package which seems to install fine on the latest Kali). I made a fork on Gitlab for the packaged version (let me know if this was not correct.) |
|
version 0.4+git20201008-0kali1 is now in kali-rolling. |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2016-10-25 22:17 | unix-ninja | New Issue | |
2018-01-29 15:13 | g0tmi1k | Note Added: 0008470 | |
2018-01-30 01:45 | unix-ninja | Note Added: 0008558 | |
2018-01-30 10:17 | g0tmi1k | Note Added: 0008568 | |
2018-01-30 15:07 | unix-ninja | Note Added: 0008583 | |
2018-02-21 09:35 | g0tmi1k | Product Version | 2016.2 => |
2020-03-30 14:36 | g0tmi1k | Note Added: 0012565 | |
2020-03-30 14:36 | g0tmi1k | Status | new => acknowledged |
2020-03-30 14:36 | g0tmi1k | Category | New Tool Requests => Queued Tool Addition |
2020-05-22 15:12 | unix-ninja | Note Added: 0012820 | |
2020-06-17 14:58 | g0tmi1k | Severity | feature => minor |
2020-12-01 11:12 | g0tmi1k | Summary | shellfire => shellfire - exploiting LFI,RFI, and command injection vulnerabilities |
2022-04-26 14:31 | sbrun | Assigned To | => sbrun |
2022-04-26 14:31 | sbrun | Status | acknowledged => assigned |
2022-05-04 12:53 | g0tmi1k | Status | assigned => acknowledged |
2022-05-31 07:18 | sbrun | Status | acknowledged => resolved |
2022-05-31 07:18 | sbrun | Resolution | open => fixed |
2022-05-31 07:18 | sbrun | Fixed in Version | => 2022.3 |
2022-05-31 07:18 | sbrun | Note Added: 0016224 |