GodzillaMemoryShellProject.NET

使用场景

当目标存在反序列化漏洞或其它漏洞,我们可以通过加载此项目的类来获得无文件的内存Shell

姊妹项目(Java 内存Shell):https://github.com/BeichenDream/GodzillaMemoryShellProject

如何使用

Web Demo

image

InjectVirtualPathProviderMemoryShell

连接时URL填写目标已存在的可执行脚本,如aspx/asmx/ashx/soap http://127.0.0.1:80/Test.aspx

image

InjectHttpListenerMemoryShell

连接时URL填写httpListenerURL,如http://127.0.0.1:80/godzilla/ http://127.0.0.1:80/ews/soap/

image

InjectHttpWebRouteMemoryShell

连接时URL填写目标已存在的路由,如http://localhost/Home/About

image

引用

https://github.com/knownsec/KCon/blob/master/2021/%E9%AB%98%E7%BA%A7%E6%94%BB%E9%98%B2%E6%BC%94%E7%BB%83%E4%B8%8B%E7%9A%84Webshell.pdf