Dotwut's Gitbook
Ctrlk
  • โš“Welcome!
    • About Me
  • ๐Ÿ‘€General Methodologies and Resources
    • OSCP Exam Playbook
    • OSCP Exam Guide (official)
    • Links
  • ๐Ÿ› ๏ธTools and Commands
    • Tools
    • Reverse Shells
    • TTY Shells
    • Command Cheatsheets
  • ๐Ÿ“ฌServices
    • Ports and Services
  • ๐Ÿ’‰Web Attacks
    • Pentesting Web Checklist
    • Pentesting Web Methodology
    • HTTP Security
    • HTTP Response Codes
    • Access Control
    • Apache
    • Authentication/OAuth
    • Buffer Overflows
    • Clickjacking
    • Client-Side Request Forgery
    • Cookies
    • Command Injection
    • Cross Origin Resource Sharing
    • Directory Traversal
    • External XML Entity
    • File Inclusion/Path Traversal
    • File Upload Bypass
    • Hashing
    • Hash-Based Message Authentication Code
    • Honeypots
    • Host Header Attacks
    • Insecure Deserialization
    • Insecure Direct Object Reference
    • JWT Tokens and Signature Bypass
    • OWASP Top 10
    • Prototype Pollution
    • Server Side Request Forgery
    • Server Side Template Injection
    • SQL Injection
    • XSS
    • Web Redirects
    • Web Sockets
    • 403 and 401 Bypasses
  • โš™๏ธAPIs
    • OWASP Top 10 API
    • What is an API?
    • WebSec Academy
  • โ˜๏ธCloud
  • ๐Ÿง AI
    • Web Sec Academy
  • ๐Ÿ”—Linux
    • Useful Linux Commands
    • Linux Environment Variables
    • Bypass Linux Shell Restrictions
    • Transferring Files on Linux
    • Linux Privilege Escalation
    • Find Command
    • /etc/
    • Linux Log Files
    • Curl
    • Cron Jobs
  • ๐Ÿ“ŽWindows
    • Basic CMD for Windows
    • Basic PowerShell For Windows
    • Transferring Files on Windows
    • How to Attack Kerberos
    • Kerberos Impacket Cheatsheet
    • Active Directory Methodology
    • Stealing Credentials
    • Windows Log Files
    • Windows Privilege Escalation
    • Remote Execution Techniques
    • Windows Buffer Overflow
  • ๐Ÿ”คProgramming Languages
    • Bash Scripting
    • Python
    • Powershell
    • PHP
    • Grep & Regular Expressions
    • gcc & g++
  • ๐Ÿ‘‰Pivoting
    • Pivot Techniques
    • Native Windows Port Forwarding with Netsh
  • ๐Ÿง Exploits
    • Xenbuild.sh OS Compiler
    • Known Working Exploits
      • Precompiled Windows/Linux Exploits
      • MS17_010 Eternal Blue on Windows XP
      • Log4j
      • DirtyCow
  • ๐ŸฅผLabs
    • TryHackMe Labs
    • HackTheBox Labs
Powered by GitBook
On this page
  1. ๐Ÿง Exploits
  2. Known Working Exploits

Log4j

LogoGitHub - badb33f/Apache-Log4j-POC: Proof of Concept of apache log4j LDAP lookup vulnerability. CVE-2021-44228GitHub

https://raxis.com/blog/log4j-exploit

PreviousMS17_010 Eternal Blue on Windows XPNextDirtyCow

Last updated 3 years ago