Skip to content

kaipee/log4shell-detector-playbook

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

log4shell-detector Playbook

This simple Ansible Playbook can be used to clone and execute the log4shell-detector pyhon script to detect CVE-2021-44228 exploit attempts in your infrastructure.

The playbook will save the findings for each host under reports/{hostname}

Instructions

Clone the repository.

git clone https://github.com/kaipee/log4shell-detector-playbook.git

Create your inventory file.

cd log4shell-detector-playbook
touch inventory

Add your host entries to the inventory file.

Run the playbook.

ansible-playbook -i inventory main.yml

Review the findings for each host under the reports directory.

grep -iTR 'attempt detected' reports/*

Credits

All credit goes to @cyberops for the log4shell-detector tool.

About

Ansible Playbook to clone and execute log4shell-detector

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published