• Stars
    star
    104
  • Rank 330,604 (Top 7 %)
  • Language
  • License
    MIT License
  • Created almost 3 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.

Trickest Log4j

Several versions of Apache Log4j are vulnerable to remote code execution (RCE). A lot of bypasses and payloads have been published; this repository aims to provide a solution that allows security teams to use all of this knowledge effectively.

Motivation

With all the research done on Log4j every day, we found it important to create a consistent process that can:

  • incorporate all of the techniques that were published and proven to be effective
  • scale across thousands of assets
  • integrate discovery techniques as quickly as they are found

So We designed a Trickest workflow. The primary input is the list of targets to check for log4j related vulnerabilities.

How it works

Trickest Workflow used:

Log4jWorkflow

TB; DZ (Too big; didn't zoom):

  • Get a list of payloads from this repository's payloads folder
  • Add some control characters that we found useful while bypassing WAFs to each payload.
  • Use an interactsh client to generate a callback URL. (Thanks ProjectDiscovery!)
  • Use unfurl to insert the callback URL with a custom endpoint into each payload - this will help us correlate each hit to a target and an attack technique (Thanks tomnomnom!)
  • Use thchydra to send the payloads to all targets across different services.
  • Use cent to collect community nuclei templates (Thanks xm1k3!).
  • Use a few custom and community nuclei templates to test using different techniques (ProjectDiscovery, thanks again!)
  • Use an interactsh client to poll the URL and get a list of vulnerable hosts (Seriously ProjectDiscovery, thank you!)
  • Generate the final report that contains all the results.

How to Update

The workflow uses this repository as a source, so any attack payloads added to this repository will be picked up and used automatically. Check out the issues for a list of ideas that will be implemented in future versions of the workflow. README.md will be updated accordingly.

To update the techniques used you can either:

  • Add string payloads to the payloads folder.
  • Add nuclei templates to the custom folder.

Resources

More Repositories

1

cve

Gather and update all available and newest CVEs with their PoC.
HTML
5,099
star
2

wordlists

Real-world infosec wordlists, updated regularly
804
star
3

inventory

Asset inventory on public bug bounty programs.
Shell
700
star
4

resolvers

The most exhaustive list of reliable DNS resolvers.
420
star
5

zip

Monitoring the internet for new .zip domains
205
star
6

mksub

Generate tens of thousands of subdomain combinations in a matter of seconds
Go
191
star
7

dsieve

Filter and enrich a list of subdomains by level
Go
145
star
8

mkpath

Make URL path combinations using a wordlist
Go
140
star
9

find-gh-poc

Find CVE PoCs on GitHub
Go
110
star
10

insiders

Archive of Potential Insider Threats
101
star
11

containers

Automated privilege escalation of the world's most popular Docker images.
Shell
62
star
12

enumerepo

List all public repositories for (valid) GitHub usernames
Go
52
star
13

safe-harbour

security.txt collection of most popular world-wide domains
50
star
14

trickest-cli

Execute Trickest workflows right from your terminal
Go
45
star
15

recon-and-vulnerability-scanner-template

Create your own recon & vulnerability scanner with Trickest and GitHub
40
star
16

cloud

Monitoring the Cloud Landscape
26
star
17

mgwls

Combine words from two wordlist files and concatenate them with an optional delimiter
Go
23
star
18

scripts

Handy scripts and one-liners to make life easier
22
star
19

elasticsearch_index

Manage attack surface data on Elasticsearch
Python
17
star
20

packages

Automated compromise detection of the world's most popular packages
13
star
21

action

Github Action for Trickest Workflows
Shell
6
star