Tag

jndi

1 views collected around this technical thread.

IT Services Circle
IT Services Circle
Jun 13, 2025 · Information Security

How a Hidden Log4j Exploit Almost Crippled the Linux Empire – A Security Drama

At dawn a sharp alarm reveals a malicious C2 connection in the Linux empire, prompting a frantic hunt through hidden processes, missing logs, and a secret traffic‑analysis system that uncovers a Log4Shell JNDI exploit launched via port 36560, ultimately exposing mis‑configured ElasticSearch and prompting emergency patches.

jndilog4jlog4shell
0 likes · 7 min read
How a Hidden Log4j Exploit Almost Crippled the Linux Empire – A Security Drama
macrozheng
macrozheng
Oct 25, 2024 · Fundamentals

Why and How Java Breaks the Parent Delegation Model: Real-World Scenarios

This article explains the purpose of Java's parent‑delegation class‑loading mechanism, describes its three built‑in loaders, shows how custom loaders can override it, and explores common situations—such as JNDI, JDBC, Tomcat, and OSGi—where developers intentionally break the delegation for flexibility and modularity.

ClassLoaderCustom ClassLoaderJDBC
0 likes · 11 min read
Why and How Java Breaks the Parent Delegation Model: Real-World Scenarios
Top Architect
Top Architect
Dec 23, 2021 · Information Security

Understanding the Critical Log4j2 Vulnerability and Emergency Mitigation Measures

The article explains the Log4j2 remote code execution flaw caused by unsafe JNDI lookups, outlines its widespread impact on Java applications and major Chinese tech firms, and provides concrete emergency mitigation steps such as JVM parameter changes, firewall rules, and upgrading to version 2.17.0.

Javainformation securityjndi
0 likes · 7 min read
Understanding the Critical Log4j2 Vulnerability and Emergency Mitigation Measures
macrozheng
macrozheng
Dec 23, 2021 · Information Security

Why JNDI Is the Hidden Threat Behind Log4j and Other Java Vulnerabilities

The article explains how JNDI works as a configuration and naming service in Java, shows its use with database drivers, and demonstrates how its SPI mechanism can be abused to load remote code, leading to serious security exploits such as the Log4j vulnerability.

Javaexploitjndi
0 likes · 6 min read
Why JNDI Is the Hidden Threat Behind Log4j and Other Java Vulnerabilities
政采云技术
政采云技术
Dec 17, 2021 · Information Security

Analyzing and Reproducing the Log4j2 Critical Vulnerability in Spring Boot Applications

This article examines the Log4j2 critical vulnerability, explains why merely having log4j‑api does not guarantee exposure, demonstrates step‑by‑step reproduction in a Spring Boot project, analyzes the JNDI injection mechanism, and outlines temporary mitigations and official fixes.

JavaSpring Bootinformation security
0 likes · 13 min read
Analyzing and Reproducing the Log4j2 Critical Vulnerability in Spring Boot Applications
Laravel Tech Community
Laravel Tech Community
Dec 14, 2021 · Backend Development

Apache Log4j 2.16.0 Released – New Features, Security Fixes, and Upgrade Guidance

Apache Log4j 2.16.0 has been released, offering updated SLF4J adapters, disabling JNDI by default to mitigate CVE‑2021‑44228, removing message lookups, and requiring Java 8+, with detailed upgrade instructions and links to download and issue trackers.

JavaSlf4jjndi
0 likes · 4 min read
Apache Log4j 2.16.0 Released – New Features, Security Fixes, and Upgrade Guidance
Java Captain
Java Captain
Jan 6, 2018 · Backend Development

Database Connection Pooling in Java: Concepts, Implementation, and Configuration

This article explains why creating a database connection for each request is inefficient, introduces the concept and configuration of connection pools, provides a custom Java DataSource implementation, and demonstrates the use of popular open‑source pools such as DBCP, C3P0, and Tomcat JNDI with complete code examples.

Connection PoolDatabaseJDBC
0 likes · 24 min read
Database Connection Pooling in Java: Concepts, Implementation, and Configuration