What do you need to know about the log4j (Log4Shell) vulnerability?

preview_player
Показать описание
A Remote Code Execution (RCE) vulnerability in the popular log4j library was published yesterday.

While any RCE vulnerability sounds bad, this one is particularly nasty because it affects absolutely any application (server and client-side) that uses a vulnerable version of the log4j library.

In this live stream, we'll go over exploitation details and will see what blue teams can do to detect the attack and protect their environments.

Access slides and other details here:

#cyber #cybersecurity #vulnerabilities #log4j #rce #remotecodeexecution #blueteaming #blueteam #blueteams #cyberattack
Рекомендации по теме
Комментарии
Автор

Thank you SANS for the great video. If I see it right, the outbound connections to e.g. a LDAP server is always unencrypted since JNDI does regular (unencrypted) lookups. That means that companies could look for unexpected outbound LDAP requests to servers on the internet right? Just curious. Would there be a way to make these outbound requests encrypted? Thank you!

metrixc