#log4shell

garryknight@diasp.org

Researchers trigger new exploit by renaming an iPhone and a Tesla | The Verge

Security researchers investigating the recently discovered and “extremely bad” Log4Shell exploit claim to have used it on devices as varied as iPhones and Tesla cars. Per screenshots shared online, changing the device name of an iPhone or Tesla to a special exploit string was enough to trigger a ping from Apple or Tesla servers, indicating that the server at the other end was vulnerable to Log4Shell.

#technology #tech #security #privacy #hacking #malware #phishing #Log4Shell #log4j

https://www.theverge.com/2021/12/13/22832552/iphone-tesla-sms-log4shell-log4j-exploit-researchers-test

gehrke_test@libranet.de

Bingo - bin mit mindestens einem System dabei. Ick freu mir.

#security


HonkHase - 2021-12-11 08:39:48 GMT

Schnelltest von #log4j auf die #Log4Shell Schwachstelle

Testet bitte alle eure Anwendungen!

RT @ThinkstCanary
You can use a point & click canarytoken from https://canarytokens.org to help test for the #log4j / #Log4Shell issue.

1) visit https://canarytokens.org;
2) choose the Log4shell token;
3) enter the email address you wish to be notified at;
4) copy/use the returned string...
https://twitter.com/ThinkstCanary/status/1469439743905697797