Skip to content

Firebasky/LdapBypassJndi

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

LdapBypassJndi

中文版本(Chinese version)

The function of the tool is to inject JNDI through LDAP

Principle: use LDAP to return serialized data and trigger local gadget

Use: Java - jar ldapbypassjndi.jar port poc.ser

Port: is the listening port, which is equivalent to the listening port of the server

Poc.ser: serializes Base64 encoded gadgets

java -jar ysoserial.jar CommonsCollections6 "calc" | base64 >win-cc6-calc-poc.ser

gif

In short, it is equivalent to a deserialization entry. To use it, you need to have a local one.

Update 2021/12/21

LDAP service for bypass log4j2

https://github.com/Firebasky/Java/blob/main/java%E6%97%A5%E5%B8%B8/%E9%97%B2%E8%B0%88log4j2.md

Reference resources:

https://kingx.me/Restrictions-and-Bypass-of-JNDI-Manipulations-RCE.html

https://www.mi1k7ea.com/2020/09/07/%E6%B5%85%E6%9E%90%E9%AB%98%E4%BD%8E%E7%89%88JDK%E4%B8%8B%E7%9A%84JNDI%E6%B3%A8%E5%85%A5%E5%8F%8A%E7%BB%95%E8%BF%87/

About

The function of the tool is to inject JNDI through LDAP

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published