Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dissecting a Log4Shell Attack #3

Open
utterances-bot opened this issue Jan 15, 2022 · 6 comments
Open

Dissecting a Log4Shell Attack #3

utterances-bot opened this issue Jan 15, 2022 · 6 comments
Labels
blog-post-comments Powered by utteranc.es

Comments

@utterances-bot
Copy link

Dissecting a Log4Shell Attack

Ever since the beginning, Log4Shell has been inseperably tied to Minecraft servers. In this post, I take apart one such attack and see what makes it tick.

https://blog.bithole.dev/log4shell-mc.html

Copy link

cocus commented Jan 15, 2022

Seems like he went dead. LDAP server is still up, but the http is dead. I saw this on my Windows modded server but I'm not even sure it'd have worked anyway. Also, I tried the vulnerability test from log4shell.huntress.com, and nothing came out of it. If I ran that specific ldap url and token they provide for my session thru ldapsearch, it doesn't show anything nor on its output, nor on the web interface itself. Not sure if that works or not.

Copy link
Owner

The HTTP server running on port 8000 does appear to be down. Interestingly enough, an observant Redditor managed to identify the binary an open-source reverse ssh daemon, originally written for CTF challenges.

All in all, the rather sloppy execution of the attack leaves me a little confused as to what the attacker's goal might be.

Copy link

cocus commented Jan 15, 2022

Interesting. Well, seems like my modded server is safe because the owners of the mod pack told me that this version doesn't have any of these issues (I have to believe them!) on TeamAOF/All-of-Fabric-4#158.
Do you reckon any other tool to check for this besides log4shell.huntress.com? Also, should an ldapsearch query from my local machine appear on these kind of test sites? Because I don't see it after using ldapsearch.

Copy link
Owner

adrian154 commented Jan 15, 2022

one wouldn't really expect ldapsearch to yield anything on your local machine - in log4shell the attacker is the one who hosts the malicious LDAP server that leads clients to download the exploit class. as for testing for the vulnerability, I haven't used the log4shell.huntress.com tool, but it appears to work in a similar way to most other scanners. If it returns a negative and you've also confirmed that the server JARs you're using are patched, I think it is reasonably safe to say that you are not vulnerable.

Copy link

bitcraft

Copy link

nu11une commented Jan 18, 2022

fyi this is the ip they're using as of now https://www.abuseipdb.com/check/185.233.105.120

@adrian154 adrian154 added the blog-post-comments Powered by utteranc.es label Mar 22, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
blog-post-comments Powered by utteranc.es
Projects
None yet
Development

No branches or pull requests

5 participants