The function of the tool is to inject JNDI through LDAP
Principle: use LDAP to return serialized data and trigger local gadget
Use: Java - jar ldapbypassjndi.jar port poc.ser
Port: is the listening port, which is equivalent to the listening port of the server
Poc.ser: serializes Base64 encoded gadgets
java -jar ysoserial.jar CommonsCollections6 "calc" | base64 >win-cc6-calc-poc.ser
In short, it is equivalent to a deserialization entry. To use it, you need to have a local one.
Update 2021/12/21
LDAP service for bypass log4j2
Reference resources:
https://kingx.me/Restrictions-and-Bypass-of-JNDI-Manipulations-RCE.html