关联漏洞
描述
This script checks the Citrix Netscaler if it has been compromised by CVE-2019-19781 attacks and collects all file system information
介绍
# CVE-NetScalerFileSystemCheck
This script checks the Citrix Netscaler if it has been compromised by CVE-2019-19781 attacks and collects all file system information.
The following files and logs will be checked (Latest version 1.13):
- Template folders for XML files
- Apache Access logfiles
- Apache Error logfiles
- Cron Jobs
- Backdoor Scripts
- Crypto Miner
- Bash logfiles
## Getting Started
The Output file will be created in the execution directory.
### Prerequisites
CVE-NetScalerFileSystemCheck.ps1 needs [plink.exe](https://the.earth.li/~sgtatham/putty/latest/w64/plink.exe) in the execution directory and can be run your local computer.
CVE-NetScalerFileSystemCheck.sh can be run your NetScaler appliance directly, e.g. under /var/tmp/.
## Running the scripts
### CCVE-NetScalerFileSystemCheck.ps1
```
.\CVE-NetScalerFileSystemCheck.ps1 -NSIP [YourNetScalerIP]
```
### CCVE-NetScalerFileSystemCheck.sh
```
bash CVE-NetScalerFileSystemCheck.sh
```
## Credits
@manuelkolloff - https://nerdscaler.com/
#
Cheers,
[Daniel Weppeler](https://danielweppeler.de)
文件快照
[4.0K] /data/pocs/233e73a6de600b1478bc0455e75c52080579a2d6
├── [4.5K] CVE-NetScalerFileSystemCheck.ps1
├── [1.3K] CVE-NetScalerFileSystemCheck.sh
└── [1.1K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。