Ox4Shell is a tool for deobfuscate Log4Shell payloads with ease.
Since the release of the Log4Shell vulnerability (CVE-2021-44228), many tools were created to obfuscate Log4Shell payloads, making the lives of security engineers a nightmare.
This tool intends to unravel the true contents of obfuscated Log4Shell payloads.
We recommend running Ox4Shell
with a provided file (-f
) rather than an inline payload (-p
), because certain shell environments will escape important characters, therefore will yield inaccurate results.
To run the tool simply:
~/Ox4Shell » python ox4shell.py --help usage: ox4shell [-h] [-d] [-m MOCK] [--max-depth MAX_DEPTH] [--decode-base64] (-p PAYLOAD | -f FILE) ____ _ _ _____ _ _ _ / __ \ | || | / ____| | | | | | | | |_ _| || || (___ | |__ ___| | | | | | \ \/ /__ _\___ \| '_ \ / _ \ | | | |__| |> < | | ____) | | | | __/ | | \____//_/\_\ |_||_____/|_| |_|\___|_|_| Ox4Shell - Deobfuscate Log4Shell payloads with ease. Created by https://oxeye.io General: -h, --help Show this help message and exit -d, --debug Enable debug mode (default: False) -m MOCK, --mock MOCK The location of the mock data JSON file that replaces certain values in the payload (default: mock.json) --max-depth MAX_DEPTH The maximum number of iteration to perform on a given payload (default: 150) --decode-base64 Payloads containing base64 will be decoded (default: False) Targets: Choose which target payloads to run Ox4Shell on -p PAYLOAD, --payload PAYLOAD A single payload to deobfuscate, make sure to escape '$' signs (default: None) -f FILE, --file FILE A file containing payloads delimited by newline (default: None)
The Log4j library has a few unique lookup functions, which allow users to look up environment variables, runtime information on the Java process, and so forth. This capability grants threat actors the ability to probe for specific information that can uniquely identify the compromised machine they targeted.
Ox4Shell uses the mock.json
file to insert common values into certain lookup function, for example, if the payload contains the value ${env:HOME}
, we can replace it with a custom mock value.
The default set of mock data provided is:
{ "hostname": "ip-127.0.0.1", "env": { "aws_profile": "staging", "user": "ubuntu", "pwd": "/opt/", "path": "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/lib/jvm/java-1.8-openjdk/jre/bin:/usr/lib/jvm/java-1.8-openjdk/bin" }, "sys": { "java.version": "16.0.2", "user.name": "ubuntu" }, "java": { "version": "Java version 16.0.2", "runtime": "OpenJDK Runtime Environment (build 1.8.0_181-b13) from Oracle Corporation", "vm": "OpenJDK 64-Bit Server VM (build 25.181-b13, mixed mode)", "os": "Linux 5.10.47-linuxkit unknown, architecture: amd64-64", "locale": "default locale: en_US, platform encoding: UTF-8", "hw": "processors: 1, architecture: amd64-64" } }
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…