{"uuid": "49ee467d-5243-46c5-8d73-7df2bdfced0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/DerechodelaRed/3790", "content": "Gu\u00eda detallada sobre la vulnerabilidad Log4J\n\n\u25aa\ufe0f\u00bfQu\u00e9 es LDAP y JNDI?\n\u25aa\ufe0fB\u00fasqueda JNDI de Log4j\n\u25aa\ufe0fEscenario Log4j normal\n\u25aa\ufe0fEscenario de explotaci\u00f3n de Log4j\n\u25aa\ufe0fConfiguraci\u00f3n de Pentest Lab\n\u25aa\ufe0fExplotaci\u00f3n de Log4j (CVE-2021-44228)\n\u25aa\ufe0fMitigaci\u00f3n\n\nhttps://www.hackingarticles.in/a-detailed-guide-on-log4j-penetration-testing/\n\n\ud83d\udd0a t.me/derechodelared", "creation_timestamp": "2021-12-20T08:03:49.000000Z"}