diff --git a/README.md b/README.md index 5116cdc..0a6fd30 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,8 @@ -# Logs2Pwn +# LogMePwn A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability. With enough amount of hardware and threads, it is capable of scanning the entire internet within a day. +![image](https://user-images.githubusercontent.com/39941993/146040886-339d1095-e861-4f1c-a009-b99732462a2b.png) + ## How it works? LogMePwn works by making use of [Canary Tokens](https://canarytokens.org), which in-turn provides email and webhook notifications to your preferred communication channel. If you have a custom callback server, you can definitely use it too! @@ -104,14 +106,22 @@ To demo the scanner, I make use of a vulnerable setup from [@christophetd](https ```groovy docker run -p 8080:8080 ghcr.io/christophetd/log4shell-vulnerable-app ``` -Then I run the tool: +![image](https://user-images.githubusercontent.com/39941993/146034544-a0c0e60d-00db-44ae-823a-5e5834888108.png) + +Then I run the tool against the setup: ```groovy ./lmp -email alerts@testing.site 127.0.0.1:8080 ``` +![image](https://user-images.githubusercontent.com/39941993/146034732-5600761b-008e-4119-83ce-b5b0f6686b7d.png) + +Which immediately triggered a few DNS lookups visible on the token history page as well as my email: + + ## Ideas & future roadmap - [ ] Built-in capability to spin up a custom DNS callback server. - [ ] Ability to identify all probable input fields by observing a basic HTTP response. +- [ ] Obfuscation payload generation. ## License & Version The tool is licensed under the GNU GPLv3. LogMePwn is currently at v1.0. @@ -119,4 +129,4 @@ The tool is licensed under the GNU GPLv3. LogMePwn is currently at v1.0. ## Credits Shoutout to the team at [Thinkst Canary](https://canary.tools/) for their amazing Canary Tokens project. -> Crafted with ♡ by [Pinaki (@0xInfection)](https://twitter.com/0xinfection). \ No newline at end of file +> Crafted with ♡ by [Pinaki (@0xInfection)](https://twitter.com/0xinfection).