webmedium
Backdoor
hackerlab
Task: Apache Tomcat 8 login form that logs user input via vulnerable Log4j 2.x; page title hints at Log4Shell. Solution: inject JNDI payload in username field, use marshalsec LDAP referral server to redirect to malicious Java class, achieve RCE and exfiltrate flag from /root/.fl4g.txt.
$ ls tags/ techniques/
jndi_injectionlog4shell_exploitationremote_codebase_loadingdata_exfiltration_via_http
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]