I am trying to make a demo for this vulnerability for a homework, and I tried to make the same repo work, but I couldn't on my mac m1. It prints the message that says "redirecting to http...". The only difference is that I started the vulnerable app locally, since there is no alternative for docker network host on mac. Do you know what could be the issue?
I am getting an error at @3:00 while executing the python file, it's not able to execute lines 144,134,86,349 and it is also not able to locate the java directory. Anybody know how to fix this?
can someone help me by explaining, what is the need of the docker? And is there an alternative method if we do not want to use docker? I need to implement this log4j vuln in a simulated environment for project. I am unsure how I can replicate this video without using a docker or if using docker makes sense in my scenario!
I think docker is used to make the demo simple. Otherwise you would have to make an own vulnerable website. You can replicate this video without using docker.
@@Roelox I am unsure about which parameters I need to change because I am trying to implement this exploit where there is a vulnerable Ubuntu webserver and there is a kali attacker machine. I am unsure which parameters in the entire process needs to change or how to I do the attack. I know definitely that the evil ldap is on the attacker kali machine right so that means the poc.py needs to state the IP address of the kali machine right? What else needs to change?
Yes that should be possible, when you run the poc.py a Exploit.java is made. You can modify this Exploit.java file with for example nano. In the file you see "String cmd="/bin/bash"; and that is the line that is used to spawn a shell. So maybe if you modify that line you could execute some other command.
hi thank you could you make a video about the windows diagnostic tool with opening a word document exploit because the one i do is detected by anti-virus.
I don't understand. You set netcat at port 9001 then you ran a python script that is a simple http-server running localhost at port 8000 but is listening on port 1389?
This is very cool and I love your avatar. Reminds me of F-society in Mr Robot. Subscribed
Thank you! And yes haha my avatar is inspired by F-society from Mr Robot.
I am trying to make a demo for this vulnerability for a homework, and I tried to make the same repo work, but I couldn't on my mac m1. It prints the message that says "redirecting to http...". The only difference is that I started the vulnerable app locally, since there is no alternative for docker network host on mac. Do you know what could be the issue?
Sorry for the super late response, add me on discord, my name on there is roelox
Hi Roel, I'm encountering this "OSError: [Errno 8] Exec format error" after this command 'sudo python3 poc.py'. Can you please help me?
Did you modify the content in poc.py?
@@Roelox no changes have been made to poc.py file, I am also getting same error
@@scorcher7297 Can you send me screenshot on discord, Roel#6931
I am getting an error at @3:00 while executing the python file, it's not able to execute lines 144,134,86,349 and it is also not able to locate the java directory. Anybody know how to fix this?
Did you install the right Java version? And did you moved it into the log4j-shell-poc directory?
@@Roelox yes sir. I did both. I installed the proper version and moved it to the right directory. I don't understand why the code isn't working
@@karthikbt7239 Do you have Discord? My discord is Roel#6931. Maybe you could send me a screenshot and i can help you.
@@Roelox that would be very helpful. I've sent you a request on discord
@@nishantnaik9543 check the java version again.
can someone help me by explaining, what is the need of the docker? And is there an alternative method if we do not want to use docker? I need to implement this log4j vuln in a simulated environment for project. I am unsure how I can replicate this video without using a docker or if using docker makes sense in my scenario!
I think docker is used to make the demo simple. Otherwise you would have to make an own vulnerable website.
You can replicate this video without using docker.
@@Roelox I am unsure about which parameters I need to change because I am trying to implement this exploit where there is a vulnerable Ubuntu webserver and there is a kali attacker machine. I am unsure which parameters in the entire process needs to change or how to I do the attack. I know definitely that the evil ldap is on the attacker kali machine right so that means the poc.py needs to state the IP address of the kali machine right? What else needs to change?
@@AadilKB Yes the IP needs to be the kali machine's IP. I think nothing else needs to change.
@@Roelox Hi there are you able to help?
@@fatrizz Ofcourse! What is the problem?
Why i cant access to localhost:8080 and refused to connect.. it is exactly same result when i ran the docker and no error message
What is the error message?
Hi roel, I just access to local host:8080 by chrome and said that refused to connect. I make sure that 8080 port is not using by tomcat
@@kthomas5280 Do you have Discord? My discord is Roel#6931
Everything went well except the connection back to the netcat. Can you help me on this?
Sure, do u have discord? My discord is Roel#6931 I can help u further on discord.
2 questions ,
1. why i am unable to ping to external ip ?
2. can you provide the source for the web app ?
External IP?
And the source for the web app should be in the github repository I think
@@Roelox another question , if i want to execute a remote script or command and not get the shell , is it possible ?
Yes that should be possible, when you run the poc.py a Exploit.java is made. You can modify this Exploit.java file with for example nano. In the file you see "String cmd="/bin/bash"; and that is the line that is used to spawn a shell. So maybe if you modify that line you could execute some other command.
hi thank you could you make a video about the windows diagnostic tool with opening a word document exploit because the one i do is detected by anti-virus.
Are you talking about Follina?
@@Roelox yes
@@rationalism_communism I sadly don't know how to bypass windows defender, sorry.
@@Roelox ok
Thanks for this poc
No problem :)
Need to develop this for a work project. 6yr olds fighting and not letting me focus.
But I found a new song :D
Thanks for your effort, so can this exploit be used in windows 10 as a target machine and kali linux as an attacker machine?
Uhh i guess if a windows machine in some way is using a vulnerable version of log4j. But idk if thats possible and idk how that works sorry.
I don't understand. You set netcat at port 9001 then you ran a python script that is a simple http-server running localhost at port 8000 but is listening on port 1389?
Netcat listener on port 9001 is for the reverse shell, port 8000 is for the webserver that hosts the java file and port 1389 is for the LDAP server.
what's the name of background music? thanks
synthwave goose - blade runner 2049
@@Roelox thanks, good video.
music bakgroud it BLADE RUNNER 2049
I know this is for dummy website. How if I want to attack the real website (lets say youtube), should I know the open port first?
U first need to make sure they are using a vulnerable version of log4j.
Btw attacking websites without permission is illegal!
Yes, but how to know the port is opened or not?@@Roelox
I just curious about that, dont worry I do not perform illegal action haha@@Roelox
nice!
Thank you!
Thank you bro . This log4j its wtf
can you help me?
Sure, what is the problem?
Nice video