Created
December 20, 2021 19:56
-
-
Save joswr1ght/a6badf9b0b148efadfccbf967fcc2b41 to your computer and use it in GitHub Desktop.
Search for log4shell attack patterns
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# Specify a starting directory as the first command-line argument to search for | |
# log4shell-style attack patterns. | |
grep -E -i -r '\$\{jndi:(ldap[s]?|rmi|dns):/[^\n]+' $1 |
The elves share the link in the North Pole, and it is available here: https://github.com/logpresso/CVE-2021-44228-Scanner Thank you!
How did I miss that? Thanks, man! Not just for the link, but for everything you all have done for the HHC! Awesome as always.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Any plans to make that log4j2-scan tool public? Seems too handy of a tool not too :D