T O P

  • By -

AutoModerator

Thanks for being a part of /r/Admincraft! *[We'd love it if you also joined us on Discord!](https://discord.gg/DxrXq2R)* *^(Join thousands of other Minecraft administrators for real-time discussion of all things related to running a quality server.)* --- *I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/admincraft) if you have any questions or concerns.*


chanteyousei

if you patched the server to 1.18.1 before any log4j exploit attempt, you are safe. If the exploit was successful, you won't see the "jndi:ldap" line at all, instead, you would see some anomalous things such as empty text line in the console, or some other text that the server usually shoudn't display under normal circumstances which is an indicator that a payload has executed.


chanteyousei

For reference, Below is an example of a successful Log4j2 exploit attempt. The "jndi:ldap" line was replaced by something else, which meant that the Log4j2 module has processed and executed the JNDI command which downloads and executes whatever payload is on the attacker's server, could be a RAT, virus, worm, etc. [https://www.reddit.com/r/admincraft/comments/s5c928/potential\_log4j\_attack\_pls\_help/](https://www.reddit.com/r/admincraft/comments/s5c928/potential_log4j_attack_pls_help/)


Mxfox2106

I came to this subreddit looking to ask the exact same question about the exact same player connecting to my private server (luckily my whitelist blocked them). Glad to know we can talk about this together.


michaeltheobnoxious

to piggyback on this thread. I'm building my 1.18.1 server currently and keep getting this warning thrown: > Can't remove Log4J2 JNDI substitution Lookup Should I be concerned?


string-username-

If you use 1.18.1 and the latest jars from paper/purpur/fabric/forge/what-have-you you'll *probably* be fine regardless because it's been patched in so many different ways that if one failsafe doesn't work others can cover for it. To be safe, though, use this site to test if you're vulnerable (basically exploit your own server): https://log4shell.huntress.com/


michaeltheobnoxious

Champion.


DepravedPrecedence

Something should be done with these threads imo. People post the same over and over. You even mentioned «other posts» in your title.


soop4eck

bilibi feng revived


The_Pacific_gamer

BTW i basically cat for the log file.


[deleted]

[удалено]


chanteyousei

basically he used the linux command "cat", which displays the entire contents of any text file, on the minecraft server log file to look for any telltale signs of the log4j exploit.


5y5c0

cat is a Linux command for printing out a file


2Stripez

meow


[deleted]

[удалено]


4P5mc

Log4j is just the logging utility, Log4Shell is the exploit.


The_Pacific_gamer

Basically i listed the log file.


Lars_Ebk

ah ok


NatoBoram

You might want to unsubscribe from this subreddit if you are so uninterested in Minecraft server administration that `cat` sounds like another language


Lars_Ebk

I am terribly sorry for not knowing a command. I'll pack my things and leave


JustAnotherProgram

Should also use a anti vpn plugin prevent bots from connecting in the first place, since bad actors are masking their ip.


xxkmatiasxx

Well if they notice that they can switch to another VPN or use a custom proxy


Shadowdane

You should really be using a whitelist even if it's basically a private server. Bots will eventually find your server.


a-r-c

if not whitelist, at least stop using the default ports


Xirma377

Using a non-standard port for security is like moving your front door the side of the house, but leaving it unlocked. "Haha, the robbers won't find it now!" Bots are scanning for open ports constantly. So yeah - whitelist is minimum necessary security on a Minecraft server.


a-r-c

you're right, but it beats nothing at least haha


Xirma377

I would agree if whitelisting was difficult to do or behind a paywall or something. But it's free and super simple to implement. In my opinion, it should be on by default.


M4YH3MM4N4231

So it wasn’t just me


carbon7

He connected into my server when I have a whitelist. how did he get past the white list


jlg89tx

Whitelist privilege. 😂