Skip to content

Latest commit

 

History

History
38 lines (21 loc) · 1.75 KB

My fruitful heist attempt with fofa.md

File metadata and controls

38 lines (21 loc) · 1.75 KB
created modified
2022-11-29 16:50:57 +0800
2022-12-05 17:48:05 +0800

My fruitful heist attempt with fofa

Fofa api requires membership. I don't want to enroll.

You first test on your vulnerable machine/app, develop scanner, exploiter and listener, then mass exploit to millions.

All recorded here: hack_all_the_thing/tests/get_log4j_vuln

zoomeye search for log4j

seebug

shodan query for log4j2 (or anything)

狮子鱼团购 fofa查询漏洞

Sqlmap post data inject

To generate password dictionary without oom: itertools.product(chrs, repeat=r)

search log4j2 in browser after login

info page of my first target (login first!)

fofa usage examples

My first target login page

gov site?

Bing-upms the system used by my first target

password dictionary topic in github