Exploiting the Log4J Vulnerability [CVE-2021–44228]

What is Log4j?

Here comes the painnn….

Okay why so serious about it?

Enough talk… now the demo of this BAD BOY!

  1. Clone the repo.
sample curl request

Mitigation

--

--

--

Prakash Ashok, Security Analyst at WeSecureApp, CTF player, Blockchain developer and Security Researcher.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

New Year Giveaway — NFTK Airdrop (Round 1)

{UPDATE} Teste de amor Emoção verdadeir Hack Free Resources Generator

Consumption of HashiCorp Vault Enterprise on Azure

DeFi protocol Pickle Finance

Padlock those fingers with a Kitty

{UPDATE} Skillful Finger Mover Hack Free Resources Generator

Why Transaction and Rent Fees Matter

BHIM UPI Cybersecurity Hackathon that never happened — submissions

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
just_a_noob

just_a_noob

Prakash Ashok, Security Analyst at WeSecureApp, CTF player, Blockchain developer and Security Researcher.

More from Medium

Continuous Profiling in Kubernetes Using Pyroscope

HTB — Forge Walkthroughs

Runner Up at BPJS Kesehatan Security Hackathon

Vulnhub: Lampião (Walkthrough)