While this is a nightmare for defenders, those of us on the offensive side have an easy RCE to pop a shell. This talk I briefly touch on impact and demonstrate how to set up a homelab in Minecraft to exploit this vulnerability. The demo is going to be a homelab setup using vagrant. Essentially you clone the repo to set up an older minecraft server with an older version of java. Then exploitation is as simple as running the payload in a minecraft chat message. If time allows, I’ll add another demonstration with how to do this on a real world system.The discussion/introduction part of the presentation will be split between infosec twitter storytime and some of the effects of log4jShell on organizations.The first part is important for practitioners who want to get good at exploiting the next zero day. The second part is useful for decision makers who want to improve their application security programs and start to think about their software supply chain.
Get notified about new features and conference additions.