richnadeau / Secure-Web-Application-CTF-Nadeau-Notter

Create a CTF that focuses on fixing the vulnerabilities and finding them.
0 stars 0 forks source link

Exploiting Log4J #3

Closed richnadeau closed 2 years ago

richnadeau commented 2 years ago

Exploiting our Log4J CTF box

richnadeau commented 2 years ago

Log4J has been successfully exploited (documentation for it here)