## https://sploitus.com/exploit?id=8F362564-1631-5AF9-BB38-D1BFC4678DAE
# ftp_over_log4j
File transfers using the log4shell vulnerability (CVE-2021-44228)
### Usage
`ftpl4j.sh [get|set] file`
### Description
To send a file, the script will start a dummy LDAP server. The file to send will be registered as an LDAP object on the server. A log4shell-triggering `jndi` is then sent over port 80, triggering the exploit and uploading the file to the remote.
To receive a file, well, wait for me to work it out.
### Contributors
MURGIA Sasha Emily Chelsea <chelsea486mhz@protonmail.com>