-
Notifications
You must be signed in to change notification settings - Fork 788
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
57 changed files
with
1,985 additions
and
354 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
--- | ||
title: "Log4Shell" | ||
date: 2022-01-12T14:07:23+05:30 | ||
draft: false | ||
tags: ["exploit", "linux", "windows"] | ||
--- | ||
|
||
The Log4Shell exploiter exploits | ||
[CVE-2021-44228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228). | ||
|
||
|
||
### Description | ||
|
||
Some versions of Apache Log4j, a Java logging framework, have a logging feature | ||
called "Message Lookup Substitution" enabled by default. This allows replacing | ||
certain special strings by dynamically-generated strings at the time of | ||
logging. If log messages or log message parameters can be controlled by an | ||
attacker, arbitrary code can be executed. The Log4Shell exploiter takes | ||
advantage of this vulnerability to propagate to a victim machine. | ||
|
||
You can learn more about this vulnerability and potential mitigations | ||
[here](https://logging.apache.org/log4j/2.x/security.html#Fixed_in_Log4j_2.15.0_.28Java_8.29). | ||
|
||
|
||
### Services exploited | ||
|
||
The Infection Monkey will attempt to exploit the Log4Shell vulnerability in the | ||
following services: | ||
|
||
- Apache Solr | ||
- Apache Tomcat | ||
- Logstash | ||
|
||
**Note**: Even if none of these services are running in your environment, | ||
running the Log4Shell exploiter can be a good way to test your IDS/IPS or EDR | ||
solutions. These solutions should detect that the Infection Monkey is attempting | ||
to exploit the Log4Shell vulnerability and raise an appropriate alert. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Binary file not shown.
16 changes: 16 additions & 0 deletions
16
envs/monkey_zoo/blackbox/config_templates/log4j_logstash.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
from copy import copy | ||
|
||
from envs.monkey_zoo.blackbox.config_templates.base_template import BaseTemplate | ||
from envs.monkey_zoo.blackbox.config_templates.config_template import ConfigTemplate | ||
|
||
|
||
class Log4jLogstash(ConfigTemplate): | ||
|
||
config_values = copy(BaseTemplate.config_values) | ||
|
||
config_values.update( | ||
{ | ||
"basic.exploiters.exploiter_classes": ["Log4ShellExploiter"], | ||
"basic_network.scope.subnet_scan_list": ["10.2.3.55", "10.2.3.56"], | ||
} | ||
) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
from copy import copy | ||
|
||
from envs.monkey_zoo.blackbox.config_templates.base_template import BaseTemplate | ||
from envs.monkey_zoo.blackbox.config_templates.config_template import ConfigTemplate | ||
|
||
|
||
class Log4jSolr(ConfigTemplate): | ||
|
||
config_values = copy(BaseTemplate.config_values) | ||
|
||
config_values.update( | ||
{ | ||
"basic.exploiters.exploiter_classes": ["Log4ShellExploiter"], | ||
"basic_network.scope.subnet_scan_list": ["10.2.3.49", "10.2.3.50"], | ||
} | ||
) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
from copy import copy | ||
|
||
from envs.monkey_zoo.blackbox.config_templates.base_template import BaseTemplate | ||
from envs.monkey_zoo.blackbox.config_templates.config_template import ConfigTemplate | ||
|
||
|
||
class Log4jTomcat(ConfigTemplate): | ||
|
||
config_values = copy(BaseTemplate.config_values) | ||
|
||
config_values.update( | ||
{ | ||
"basic.exploiters.exploiter_classes": ["Log4ShellExploiter"], | ||
"basic_network.scope.subnet_scan_list": ["10.2.3.51", "10.2.3.52"], | ||
} | ||
) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.