Skip to content

Latest commit

 

History

History
39 lines (24 loc) · 871 Bytes

README.md

File metadata and controls

39 lines (24 loc) · 871 Bytes

log4shell-detector Playbook

This simple Ansible Playbook can be used to clone and execute the log4shell-detector pyhon script to detect CVE-2021-44228 exploit attempts in your infrastructure.

The playbook will save the findings for each host under reports/{hostname}

Instructions

Clone the repository.

git clone https://github.com/kaipee/log4shell-detector-playbook.git

Create your inventory file.

cd log4shell-detector-playbook
touch inventory

Add your host entries to the inventory file.

Run the playbook.

ansible-playbook -i inventory main.yml

Review the findings for each host under the reports directory.

grep -iTR 'attempt detected' reports/*

Credits

All credit goes to @cyberops for the log4shell-detector tool.