Log4j RCE or CVE-2021-44228 is a critical common vulnerability, this allow attacker to do remote code execution on target website. Scanning and Exploiting Log4j can be done manually and also you can automate this by using a tool for scanning and exploit Log4j RCE or CVE-2021-44228.
A fully automated, accurate, and extensive scanner for finding vulnerable log4j (CVE-2021-44228) hosts or websites developed by Fullhunt.io.
We have been researching the Log4J RCE (CVE-2021-44228) since it was released, and we worked in preventing this vulnerability with our customers. We are open-sourcing an open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability. This shall be used by security teams to scan their infrastructure for Log4J RCE, and also test for WAF bypasses that can result in achieving code execution on the organization’s environment.
It supports DNS OOB callbacks out of the box, there is no need to set up a DNS callback server.
- Support for lists of URLs.
- Fuzzing for more than 60 HTTP request headers (not only 3-4 headers as previously seen tools).
- Fuzzing for HTTP POST Data parameters.
- Fuzzing for JSON data parameters.
- Supports DNS callback for vulnerability discovery and validation.
- WAF Bypass payloads.
Scan a Single URL
Scan a Single URL using all Request Methods: GET, POST (url-encoded form), POST (JSON body).
Discover WAF bypasses against the environment.
Scan a list of URLs
This project is made for educational and ethical testing purposes only. Usage of log4j-scan for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.