Skip to content

Commit 2b6811b

Browse files
committed
v1.2.4
1 parent 544b09c commit 2b6811b

File tree

4 files changed

+67
-17
lines changed

4 files changed

+67
-17
lines changed

CHANGELOG.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,12 @@
1+
## 1.2.4
2+
3+
- [功能] 同步更新 Class-Obf v1.3.1 版本 (https://github.com/jar-analyzer/class-obf) @4ra1n
4+
- [功能] 同步更新 java-memshell-generator(Jmg) v1.0.9 版本
5+
- [功能] 新增 XmlDeSerPayload @unam4
6+
- [功能] 新增 OpengaussJdbc 链 @guchangan1
7+
- [功能] 自定义web登录密码,自定义是否关闭鉴权
8+
- [优化] java-memshell-generator(Jmg) 优化报错提示;支持自动生成随机字符串参数,用于减少特征
9+
110
## 1.2.3
211

312
- [功能] 支持字节码混淆,集成 Class-Obf(https://github.com/jar-analyzer/class-obf)项目 @4ra1n

CHANGELOG_EN.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,13 @@
1+
## 1.2.4
2+
3+
- [Feature] Synchronized update to Class-Obf v1.3.1 (https://github.com/jar-analyzer/class-obf) @4ra1n
4+
- [Feature] Synchronously update java-memshell-generator to version v1.0.9
5+
- [Feature] Added XmlDeSerPayload @unam4
6+
- [Feature] Added OpengaussJdbc chain @guchangan1
7+
- [Feature] Customize web login password, customize whether to disable authentication.
8+
- [Optimization] java-memshell-generator (Jmg) optimizes error message prompts; supports automatically generating random string parameters to reduce signatures.
9+
10+
111
## 1.2.3
212

313
- [Feature] Support for bytecode obfuscation, integrated with the Class-Obf project by @4ra1n

README.md

Lines changed: 27 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@
4545
- 支持生成 `JavaWrapper` 格式
4646
- 支持生成 `charsets.jar` 格式
4747
- 支持增强魔改版 `JMG/JEG` 格式 (java echo generator, java memshell generator)
48-
2. JNDI: JNDI 注入利用模块
48+
2. `JNDI`: JNDI 注入利用模块
4949
- `JndiBasicPayload`: LDAP 远程加载字节码
5050
- `JndiDeserializationPayload`: LDAP 中基于 javaSerializedData 字段实现的反序列化
5151
- `JndiResourceRefPayload`: LDAP 基于 BeanFactory 的 Tomcat EL、Groovy等利用
@@ -85,12 +85,18 @@ docker run -d \
8585
-p 3308:3308 \
8686
-p 11527:11527 \
8787
-p 50000:50000 \
88-
javachains/webchains:1.2.3
88+
-e CHAINS_AUTH=true \
89+
-e CHAINS_PASS= \
90+
javachains/webchains:1.2.4
8991
```
9092

91-
生成功能仅使用 `8011` 端口即可,其他端口为 `exploit` 模块使用
93+
可通过环境变量配置鉴权或密码;
94+
**CHAINS_AUTH**: true为开启鉴权,false为关闭鉴权,默认开启鉴权
95+
**CHAINS_PASS**: 指定web密码,若该变量为空则随机生成密码,默认随机生成密码
9296

93-
请使用以下命令获得随机生成的强密码
97+
备注:生成功能仅使用 `8011` 端口即可,其他端口为 `exploit` 模块使用
98+
99+
使用以下命令从docker中获取随机生成的强密码
94100

95101
```shell
96102
docker logs $(docker ps | grep javachains/webchains | awk '{print $1}') | grep -E 'password'
@@ -104,9 +110,24 @@ docker logs $(docker ps | grep javachains/webchains | awk '{print $1}') | grep -
104110

105111
访问 `http://your-ip:8011` 即可(使用这里的用户名密码登录)
106112

113+
107114
### 方式二:Jar包启动
108115

109-
使用 `java -jar web-chains-v1.2.3.jar` 即可启动
116+
使用 `java -jar web-chains.jar` 即可启动,每次启动后会打印出随机生成的密码
117+
118+
默认监听 0.0.0.0 ,访问 `http://your-ip:8011` 即可(使用这里的用户名密码登录)
119+
120+
可通过环境变量设置web登录密码,例如:
121+
122+
Linux:
123+
```bash
124+
export CHAINS_PASS=[your_password] && java -jar web-chains.jar
125+
```
126+
127+
Windows:
128+
```cmd
129+
set CHAINS_PASS=[your_password] && java -jar web-chains.jar
130+
```
110131

111132
## 详细使用
112133

@@ -130,6 +151,7 @@ docker logs $(docker ps | grep javachains/webchains | awk '{print $1}') | grep -
130151
- https://github.com/Whoopsunix/PPPYSO
131152
- https://github.com/jar-analyzer/class-obf
132153
- https://github.com/4ra1n/mysql-fake-server
154+
- https://github.com/jar-analyzer/class-obf
133155
- https://github.com/mbechler/marshalsec
134156
- https://github.com/frohoff/ysoserial
135157
- https://github.com/H4cking2theGate/ysogate
@@ -142,14 +164,6 @@ docker logs $(docker ps | grep javachains/webchains | awk '{print $1}') | grep -
142164
- https://xz.aliyun.com/t/5381
143165
- http://rui0.cn/archives/1408
144166

145-
## 交流
146-
147-
交流群请扫码
148-
149-
<p align="center">
150-
<img src="img/group.png" width="300px">
151-
</p>
152-
153167
## Star History
154168

155169
[![Star History Chart](https://api.star-history.com/svg?repos=java-chains/web-chains&type=Date)](https://star-history.com/#java-chains/web-chains&Date)

README_EN.md

Lines changed: 21 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -88,12 +88,15 @@ docker run -d \
8888
-p 3308:3308 \
8989
-p 11527:11527 \
9090
-p 50000:50000 \
91-
javachains/webchains:1.2.3
91+
-e CHAINS_AUTH=true \
92+
-e CHAINS_PASS= \
93+
javachains/webchains:1.2.4
9294
```
9395

94-
The build function only uses the `8011` port, and the other ports are used by the `exploit` module
96+
Authentication and password can be configured via environment variables:
9597

96-
Please use the following command to get a randomly generated strong password
98+
**CHAINS_AUTH**: Set to true to enable authentication, false to disable it. Authentication is enabled by default.
99+
**CHAINS_PASS**: Specifies the web password. If this variable is empty, a password will be generated randomly. By default, a password is generated randomly.
97100

98101
```shell
99102
docker logs $(docker ps | grep javachains/webchains | awk '{print $1}') | grep -E 'password'
@@ -109,7 +112,21 @@ Just visit `http://your-ip:8011` (log in with your username and password here)
109112

110113
### Method 2: Start the JAR package
111114

112-
Use `java -jar web-chains-v1.2.3.jar` to get started
115+
You can start it by using java -jar web-chains.jar. After each startup, a randomly generated password will be printed.
116+
117+
It listens on 0.0.0.0 by default. You can access it by visiting http://your-ip:8011 (use the username and password printed earlier to log in).
118+
119+
You can set the web login password via environment variables, for example:
120+
121+
Linux:
122+
```bash
123+
export CHAINS_PASS=[your_password] && java -jar web-chains.jar
124+
```
125+
126+
Windows:
127+
```cmd
128+
set CHAINS_PASS=[your_password] && java -jar web-chains.jar
129+
```
113130

114131
## Detailed use
115132

0 commit comments

Comments
 (0)