Exploit Log4J w/ a Reverse Shell on Ghidra (Log4Shell Demo) | HakByte
On this episode of HakByte, Alex Lynd demonstrates a Log4Shell attack against Ghidra, and shows how a reverse shell can be established on compromised systems running the vulnerable Log4J Java framework.
This framework runs on millions of Java powered devices and was recently exploited, exposing a dangerous vulnerability that uses a single line of code to hack vulnerable systems.
To support the HakByte show, check out our webstore at !
Links:
Ghidra Download:
Log4Shell Demo:
Alex’s Twitter:
Alex’s Website:
Alex’s GitHub:
Alex’s Youtube:
Chapters:
Intro 00:00
What is Log4J? 00:16
Log4Shell Exploit Explained 00:40
Vulnerable Programs 01:11
Set up the Log4Shell Demo 02:33
Create a Webserver 03:11
Netcat Reverse Shell Listener 04:01
Set up Log4Shell Demo 05:
1 view
0
0
1 year ago 00:01:33 1
Набор на приватный сервер Friends Shield ⚔️ Бесплатный Ванилльный Minecraft
2 years ago 00:41:14 1
Live Hacking: Breaking into Your Web App • Brian Vermeer • GOTO 2022
3 years ago 00:21:49 1
Crazy JSP Web Shell to Exploit Tomcat - Real World CTF 2022
3 years ago 00:13:37 2
Detect Vulnerable Log4J Websites with CanaryTokens | HakByte
3 years ago 00:23:11 1
DuckDuckGo’s Desktop Browser is Almost Here - Surveillance Report 68
3 years ago 00:26:31 1
Log4J & JNDI Exploit: Why So Bad? - Computerphile
3 years ago 00:41:26 1
A TorVPN we’re actually excited for - Surveillance Report 67