Detect Vulnerable Log4J Websites with CanaryTokens | HakByte

On this episode of HakByte, Alex Lynd demonstrates how to test if web applications are vulnerable to the Log4Shell exploit, using CanaryTokens. Links: Support the Show! Buy a WiFi Nugget here: Alex’s Demo: Kozmer’s Demo: Alex’s Twitter: Alex’s Website: Alex’s GitHub: Chapters: 00:00 Intro 00:15 What is Log4J? 00:23 What is Log4Shell? 00:58 CanaryTokens Tools You’ll Need 01:22 PCBWay Manufacturing Services 01:35 Register Log4Shell CanaryToken 03:05 Log4J Vulnerability Explained 03:42 Vulnerable WebApp Setup 06:05 User Agent Strings 08:05 Modifying the Browser User Agent 08:40 Testing the Log4Shell Vulnerability 09:34 CanaryTokens Log4Shell Monitor 10:48 Log4Shell String Explained 12:48 Outro -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Hak5 -- Cyber Security Education, Inspiration, News & Community since
Back to Top