使用修改版ysoserial和JNDI-Exploit-Kit复现log4j漏洞(适配各jdk版本)
介绍
本次复现环境使用的为hack the box的logforge靶场
修改版ysoserial介绍
- ysoserial-modified
修改版ysoserial主要参考了$@|sh – Or: Getting a shell environment from Runtime.exec这篇英文文章,如下。
1 | $ java Exec 'sh -c $@|sh . echo ps ft' |
Hack-The-Box-pwn-challenge[echoland]
详细过程及exp
0. Connect to the binary:
The only information provided with this challenge was an IP address and port number.
You can connect to the binary using for example netcat as below:
1 | ┌──(root💀kali)-[~/hackthebox/challenge/pwn/echoland] |
Typing HELLO or asd resulting in the same value echoed back.
Another option is to (1) Scream…
1 | 1. Scream. |
Hack-The-Box-reversing-challenge[rauth]
Here's something encrypted, password is required to continue reading.