4

log4j2burpscanner、 Log4j 漏洞构造的蜜罐

 2 years ago
source link: https://www.heibai.org/2068.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

log4j2burpscanner、 Log4j 漏洞构造的蜜罐

桑云信息Lzers 2021-12-13 log4j2burpscannerLog4j蜜罐

1、利用 Log4j 漏洞构造的蜜罐

这个蜜罐运行假的 Minecraft 服务器(1.17.1)等待被利用。有效载荷类保存到payloads/目录。

page_copy.png
git clone https://github.com/Adikso/minecraft-log4j-honeypot.git
cd minecraft-log4j-honeypot
go build .
./minecraft-log4j-honeypot

下载地址:https://github.com/Adikso/minecraft-log4j-honeypot

2、log4j2burpscanner

CVE-2021-44228,log4j2 burp插件 Java版本,dnslog选取了非dnslog.cn域名 效果如下:

靶场的 (靶场比较慢,但是互联网资产是没问题的,原因应该在于靶场对于其他请求头的处理不好,或者请求头过大,导致靶场反应较慢,多等等即可)

20211213065851163934993126540.jpg

20211213065852163934993269649.jpg

试了两个SRC的站点 

20211213065853163934993327926.jpg

加载后,会给出一个url,访问就可以查看dns的记录,当然,插件本身自带检查dns记录,这里只起后续方便查看的作用 

20211213065854163934993492713.jpg特点如下:

0x01 基于Cookie字段、XFF头字段、UA头字段发送payload

0x02 基于域名的唯一性,将host带入dnslog中

插件主要识别五种形式:

1.get请求,a=1&b=2&c=3

2.post请求,a=1&b=2&c=3

3.post请求,{“a”:”1”,”b”:”22222”}

4.post请求,a=1&param={“a”:”1”,”b”:”22222”}

5.post请求,{"params":{"a":"1","b":"22222"}}

如果需要在repeater里进行测试

需要打开dashbord→Live passive crawl from Proxy and Repeater→勾选repeater

需要打开dashbord→Live audit from Proxy and Repeater→勾选repeater 

20211213065855163934993569643.jpg

20211213065856163934993663351.jpg

下载地址:https://github.com/f0ng/log4j2burpscanner

文由HACK之道


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK