关联漏洞
描述
Automated forensic script hunting for cve-2019-19781
介绍
# CVE-2019-19781-Forensic
## Note : My advice is now to use the official tool published by fireeye & citrix : https://github.com/fireeye/ioc-scanner-CVE-2019-19781
##### This little script was created to help security analyst to discover traces of successful CVE-2019-19781 exploits on their systems.
Feel free to fork and improve !
You can find an example of output on a compromised system : [output_demo.txt](https://github.com/onSec-fr/CVE-2019-19781-Forensic/blob/master/output_demo.txt "output_demo.txt").
##### Usage
1- Login on your Citrix Gateway with nsroot (or other high privileged account).
2- Download the script :
`curl -o CVE-2019-19781-Forensic.sh https://raw.githubusercontent.com/onSec-fr/CVE-2019-19781-Forensic/master/script.sh`
3- Make it executable :
`chmod +x CVE-2019-19781-Forensic.sh`
4- Specify an output filename :
`./CVE-2019-19781-Forensic.sh <output>`
5- Done !
文件快照
[4.0K] /data/pocs/58b4b2cca0d2d871503cf423a822001c7a7c1e3b
├── [1.0K] LICENSE
├── [ 32K] output_demo.txt
├── [ 902] README.md
└── [2.2K] script.sh
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。