Logging utilities, exemplified by the widely used Apache Log4j, serve as valuable tools for streamlining debugging processes. However, recent revelations have brought to light critical vulnerabilities in this utility, which can be exploited for remote code execution and denial of service attacks. Particularly concerning is the default configuration of Apache Log4j, which facilitates JNDI (Java Naming and Directory Interface) lookups. This configuration opens avenues for potential exploitation, allowing malicious actors to exfiltrate data or execute arbitrary code via remote services like LDAP, RMI, and DNS.