SecEng @awscloud. CTFs with @pb_ctf. DEFCON & BHUSA speaker. Passionate about everything tech. My opinions are my own. Ex-@Tesla @bishopfox @PaloAltoNtwks
Dec 18, 2021 • 5 tweets • 2 min read
Is anyone able to reliably "crash/kill" the application completely using this log4j DoS hype ride?
So far I'm yet to reproduce a weaponizable damage outside of denying logging. (IllegalStateException) 🤔
Expansion payload (10k reps or more) will do StackOverflow exception (1/n)
Along with @0xsapra , we reproduced it against 2.14 giving it the priority as it has lookups enabled by default.
To weaponize, the goal was to kill/crash the app not just throw Exception.
We tried multiple payload deliveries-
1.) GET request (max size 2048):
Payload used was
Dec 13, 2021 • 5 tweets • 3 min read
How to attack any JDK version for log4j "without" guessing classpath on server?
Try to exfiltrate the class path using ${sys:java.class.path} or ${env:CLASSPATH}.
What if it fails? Don't forget java. net.URL is serializable! You can bruteforce ClassName