Exploiting the Log4J Vulnerability [CVE-2021–44228]

What is Log4j?

Here comes the painnn….

Okay why so serious about it?

Enough talk… now the demo of this BAD BOY!

  1. Clone the repo.
sample curl request

Mitigation

--

--

--

Prakash Ashok, Security Analyst at WeSecureApp, CTF player, Blockchain developer and Security Researcher.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} Dream Electric Sheep Hack Free Resources Generator

Explaining the workflow of a Web Stack

Secure Document Sharing: What Platform Should Your Law Firm Use? [Infographic]

A New Ransomware Targeting Apple macOS Users Through Pirated Apps

{UPDATE} Christmas Face Paint Party Hack Free Resources Generator

Withdrawals in BitSeeFull

Cybersecurity Decentralized

Important: Anti-Bot measures for UNV Uniswap Listing

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
just_a_noob

just_a_noob

Prakash Ashok, Security Analyst at WeSecureApp, CTF player, Blockchain developer and Security Researcher.

More from Medium

Simple CTF — Try Hack Me

DVWA BLIND Sqli

Java/Set Editing Restrictions in Word

Log4Shell