💥 Exploiting "Spring Boot" web application vulnerable to Log4Shell.
---
📝 Test your apps for #log4shell vulnerability :
1. Generate a DNS token https://canarytokens.org/generate#
2. Wrap that token in
Prefix: ${jndi:ldap://
Suffix: /a}
3. Use that value in search forms, profile data, settings etc. of your apps
4. Get notified when you triggered a reaction
-----
Join Discord :
/ discord
Follow On Github :
https://github.com/exploitblizzard
Watch video Log4Shell vulnerability | 0 Day RCE exploit in Java logging library log4j2 | CVE-2021-44228 online without registration, duration hours minute second in high quality. This video was added by user Exploit Blizzard 11 December 2021, don't forget to share it with your friends and acquaintances, it has been viewed on our site 11,121 once and liked it 143 people.