Log4j Vulnerability Scanning & Detection Tools

We should always think if we’re using software that has the Log4j component, it could be affected. We’re sharing some useful tools for you to help detect Log4j vulnerabilities. However, we want to clarify one thing: If these tools could not find anything at the moment, it does not mean that we’re safe. All tools and systems are still updating, new CVEs are being added. So, we need to follow updates, news, and details every day.



a. log4j-scan

You can use the Log4j scanning tool to check your system. This tool is a fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228. You can download from the Github repository and install the requirements easily.


Installation: You need to clone the Github repository and install the required dependencies.


$ git clone https://github.com/fullhunt/log4j-scan



$ pip3 install -r requirements.txt



Usage: You can run your log4j-scan script now if everything works fine.


If you want to scan a single URL:


$ python3 log4j-scan.py -u <your_url>

If you want scan a Single URL using all Request Methods: GET, POST (url-encoded form), POST (JSON body):


$ python3 log4j-scan.py -u <your_url> --run-all-tests

If you want to discover WAF bypasses on your environment:


$ python3 log4j-scan.py -u <your_url> --waf-bypass

If the target is not vulnerable, log4j-scan tool output is “Targets do not seem to be vulnerable".




If the target is vulnerable, log4j-scan tool output is “[!!!] Target Affected



b. Huntress Log4Shell Vulnerability Tester

Huntress Log4Shell Vulnerability Tester tool works by generating a random unique identifier which you can use when testing input fields. If an input field or application is vulnerable, it will reach out to this website over LDAP. Our LDAP server will immediately terminate the connection, and log it for a short time.



c. BurpSuite Log4Shell Scanner

You can find a Burp Extender Plugin for Enterprise and Professional related to Log4j vulnerability. The plugin is available in the BApp Store under the name Log4Shell Scanner.



d. Others

Many companies such as Qualys, Nessus, Datto, Cloudflare which provide cybersecurity and vulnerability management services, announced that they have added plugins and controls related to this critical vulnerability. You can check all details from their knowledge base libraries.



Conclusion

In this blog post, we’ve briefly explained what Log4Shell is, why the vulnerability is important, how it can be exploited, and some remediation advice to protect ourselves against this vulnerability. We also shared different and useful tools with you, all of which are capable of scanning and detecting the vulnerability.


We hope you enjoyed it! Check out our Vulnerability Management and Penetration Testing services to stay secure!.

Comments

Popular posts from this blog

OSINT Tool in Termux

Active Directory Ransomware Attacks

How to perform a Man-in-the-middle (MITM) attack with Kali Linux