Recently log4j2 vulnerability has been widely spread, for the basic JNDI lookup can be as easy as
${jndi:ldap://127.0.0.1:3089/}
But this isn't a common way to doing it. I had seed some of the hacker trying to use pattern lookup as complex as
${${::-j}${::-n}${::-d}${::-i})
I would like to know where is this document based on? How can we know what other the pattern they can inject?