Why The Log4j Exploit Was So Dangerous

preview_player
Показать описание
Why is Log4jShell, or CVE-2021-44228 so dangerous? There are a number of reasons, and we go through them in this video. First, the barrier for attackers to use this exploit is incredibly low and the payoff is incredibly high.This exploit leads to unauthenticated remote code execution (RCE) on systems running log4j, which includes systems running Minecraft and hosting Steam, iCloud, and other apps. Patching can also be a problem for engineering teams, and we go through that here as well.

Ref:

⭐️ Find me at:

Interested in starting a lab or sprucing up your home office? Check out these affiliate links for cool things I highly recommend! These also go to help support the channel!
👇👇👇👇👇👇👇👇👇👇👇

Note: I receive a small commission from any purchases of any of the gear shown in the affiliate link above. This supports the channel and keeps the content free! 😎 Enjoy the quality of this video? Consider getting what I use to make this content!
Рекомендации по теме
Комментарии
Автор

shout out to all of my fellow cyber-defense warriors. we're at war and no one is comming to aid us.

nelsonjunior
Автор

"An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled".
Does this vulnerability require LDAP? Is that installed by default? Am I still vulnerable if I don't have LDAP running?

guy
join shbcf.ru