Closed
Description
Description
Replace the hard-coded Log4Shell exploiter with a new and improved, fully tested, Log4Shell exploiter plugin.
Tasks
- Create plugin skeleton (0d) @cakekoa
- options (pydantic)
- determine what options Log4Shell should have
- create a pydantic model for Log4Shell options
- Create plugin manifest
- Create config schema
- options (pydantic)
- Create a Pipfile for dependencies (0d) @ilija-lazoroski
- Migrate the
LDAPServer
from multiprocessing to multithreading (0d) - @shreyamalviya - migrate the log4shell exploiter to a plugin (0d)
- plugin.py - @shreyamalviya
- command builder - @ilija-lazoroski
- exploiter - @shreyamalviya
- exploit client - @ilija-lazoroski
- use
HTTPBytesServer
in place ofExploitClassHTTPServer
- @shreyamalviya
- Update Jenkins (0d)
- Add a jenkins job to build the plugin (needs to build windows dependencies) - @shreyamalviya
- Update the island build jobs on Jenkins to copy the artifacts from the Log4Shell plugin build job
- Update ETE test configurations (0d) - @shreyamalviya
- Remove the hard-coded Log4Shell plugin (0d) - @shreyamalviya
- Don't forget to remove the dependencies from the agent's Pipfile
- Remove WebRCE
- Remove vulture entries
- Extra and ETE testing (0.25d) @ilija-lazoroski
- consolidate
from twisted.internet import reactor
imports and test; see this