Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is a technical analysis of the Log4Shell exploit payload that we published the other day.

I wanted to use it as a moment to help others understand what this exploit is and how they could build it themselves to hopefully make mitigating this easier too.

I'm going to go finish up adding a section on how to decompile the compiled byte code back into Java code that you can read. I'll add that in a few mins to the post.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: