关联漏洞
描述
Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes
介绍
# log4j-nullroute
Quick script to ingest IP feed from greynoise.io for log4j (CVE-2021-44228) and null route bad addresses. Works w/Cisco IOS-XE and Arista EOS.
Use the exceptions file to omit any IPs you find in the list that you do not want to null route.
Required fill-ins for vars:
secrets.py
------------
username, password, api_key
nullroute.py
-------------
edge_routers
文件快照
[4.0K] /data/pocs/3f1bf70c83b38b8d80c38c53e452c6b5ce57abb3
├── [ 15] log4j_malicious-ips-exceptions.txt
├── [3.7K] nullroute.py
├── [ 381] README.md
├── [ 16] requirements.txt
└── [ 314] secrets.py
0 directories, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。