Course
This lab focuses on exploiting a vulnerability in Log4j by setting up a malicious LDAP server and using a specific payload to gain code execution. It provides step-by-step instructions and necessary code snippets to demonstrate the vulnerability's exploitation process.
Included with PRO
Full course content
1 video
Common mistakes
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.