0xalwayslucky :: ~ >> ./exploit.py
[+] attacking /dev/brain
[+] target vulnerable
[+] authentication bypassed
[+] dumping interests
[*] binary exploitation
[*] network security
[*] web application security
[*] active directory security
[*] linux & windows privilege escalation
Traceback (most recent call last):
File "<exploit.py>", line 278, in <module>
IndexError: list index out of range
0xalwayslucky :: ~ >> vim exploit.py
___________________________________________________________________________________________________________________
exploit.py ______________________________________________________________________________________________ < buffers
1 #!/usr/bin/env python3
2 from pwn import *
0xalwayslucky / log4j-polkit-poc Goto Github PK
View Code? Open in Web Editor NEWvulnerable setup to display an attack chain of log4j CVE-2021-44228 with privilege escalation to root using the polkit exploit CVE-2021-4034