Nov. 21, 2023, 7 p.m. | /u/forgambo

cybersecurity www.reddit.com

In this blog post, I've shared my recent experience with Log4Shell exploitation, where I used a not-so-well-known technique.
Interestingly, this approach succeeded while the 'classic' method did not.


https://open.substack.com/pub/olexvel/p/log4shell-different-avenues-of-exploitation?r=3u101&utm\_campaign=reddit&utm\_medium=web

blog blog post cybersecurity experience exploitation log4shell well-known

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Engineer, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

BaaN IV Techno-functional consultant-On-Balfour

@ Marlabs | Piscataway, US

Senior Security Analyst

@ BETSOL | Bengaluru, India

Security Operations Centre Operator

@ NEXTDC | West Footscray, Australia

Senior Network and Security Research Officer

@ University of Toronto | Toronto, ON, CA