Skip to content

Ochaun/LastLog4jDemo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 

Repository files navigation

LastLog4J - Demo VM for Log4Shell

This project is a semi-automated homelab for exploiting the Log4Shell (CVE-2021-44228) vulnerability in Minecraft. This CTF style lab has a flag called ~/secrets.txt. The goal is to use the use the malicious LDAP server running on 172.30.1.5 to get Remote Code Execution within the game and read the contents of the file.

Background

Back in Dec 2021, when this exploit was taking off in the wild. I released a tutorial video on setting this up. Most of the manual steps in this video is covered with Vagrant shell provisioners. #logs4j Minecraft Homelab Tutorial

Getting Started

  1. Install Virtualbox & Vagrant
  2. vagrant plugin install vagrant-vbguest
  3. vagrant up && vagrant reload
  4. Get ☕ and wait until provisioners are done, before interacting with the GUI

Time to play

  1. Login to the VM using vagrant default creds
  2. Launch a terminal window and enter minecraft-launcher
  3. Sign into a Mojang/Microsoft account before playing
  4. Install 1.12.2 launcher ah
  5. Select Multiplayer and direct connect to
  6. Run the exploit in the game

*Hint: This lab comes with the feihong-cs/JNDIExploit look at it to see how it's done. *

View Running Services

After getting the flag, you can view the services under the hood via SSH.

  1. vagrant ssh
  2. sudo su -
  3. screen -ls
  • Minecraft-Server is game; Malicious LDAP Server is killbox
  1. Detach from screen Ctrl-a Ctrl-d

Burn it down

Get rid of the VM when your done vagrant destroy -f

About

Minecraft Vagrantbox for Log4Shell demo

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages