Exploring log4j RCE vulnerability

STEP 1: Run the vulnerable app

STEP 2: Run a rogue LDAP server

Step3: Prepare the payload

STEP 5: Attacking the vulnerable app.

Other Observations




facinated by security, ai, space, technology...

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How Do Servers Protect You?

Best VPNs You Can Trust (And Afford)

Lost Digital Photos: What Are the Odds to Win Them Back?

{UPDATE} Chained Trucks Stunt City Hack Free Resources Generator

Supermoon(OSM) Will be Available on CoinTiger. 390,000,000,000 OSM to Give Away!

BIGBNB Will be Available on CoinTiger on 16 December

Nimbus Platform listado en Exchange Koinbazar

Nimbus Platform NBU listed Exchange Koinbazar

Extreme Hacking Mindset

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


facinated by security, ai, space, technology...

More from Medium

Proxies, SSRF and beyond! (TSJ CTF 2022 nimja writeup)

Runner Up at BPJS Kesehatan Security Hackathon

wtfCTF 2022— web challenge [1–4] WalkThrough

Lab: CORS vulnerability with internal network pivot attack — walkthrough