Log4j Vulnerability Scanning & Detection Tools
We should always think if we’re using software that has the Log4j component, it could be affected. We’re sharing some useful tools for you to help detect Log4j vulnerabilities. However, we want to clarify one thing: If these tools could not find anything at the moment, it does not mean that we’re safe. All tools and systems are still updating, new CVEs are being added. So, we need to follow updates, news, and details every day.
a. log4j-scan
You can use the Log4j scanning tool to check your system. This tool is a fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228. You can download from the Github repository and install the requirements easily.
Installation: You need to clone the Github repository and install the required dependencies.
$ git clone https://github.com/fullhunt/log4j-scan
$ pip3 install -r requirements.txt
Usage: You can run your log4j-scan script now if everything works fine.
If you want to scan a single URL:
$ python3 log4j-scan.py -u <your_url>
If you want scan a Single URL using all Request Methods: GET, POST (url-encoded form), POST (JSON body):
$ python3 log4j-scan.py -u <your_url> --run-all-tests
If you want to discover WAF bypasses on your environment:
$ python3 log4j-scan.py -u <your_url> --waf-bypass
If the target is not vulnerable, log4j-scan tool output is “Targets do not seem to be vulnerable".
If the target is vulnerable, log4j-scan tool output is “[!!!] Target Affected”
b. Huntress Log4Shell Vulnerability Tester
Huntress Log4Shell Vulnerability Tester tool works by generating a random unique identifier which you can use when testing input fields. If an input field or application is vulnerable, it will reach out to this website over LDAP. Our LDAP server will immediately terminate the connection, and log it for a short time.
c. BurpSuite Log4Shell Scanner
You can find a Burp Extender Plugin for Enterprise and Professional related to Log4j vulnerability. The plugin is available in the BApp Store under the name Log4Shell Scanner.
d. Others
Many companies such as Qualys, Nessus, Datto, Cloudflare which provide cybersecurity and vulnerability management services, announced that they have added plugins and controls related to this critical vulnerability. You can check all details from their knowledge base libraries.
Conclusion
In this blog post, we’ve briefly explained what Log4Shell is, why the vulnerability is important, how it can be exploited, and some remediation advice to protect ourselves against this vulnerability. We also shared different and useful tools with you, all of which are capable of scanning and detecting the vulnerability.
We hope you enjoyed it! Check out our Vulnerability Management and Penetration Testing services to stay secure!.









Comments
Post a Comment