What is Log4Shell (Log4J RCE) and why does it matter?
👍👍👍 and subscribe for more info on Log4Shell: https://www.youtube.com/channel/UC2vVVgKKzN-Gb_xeaUY0o-Q?sub_confirmation=1
Check out my best selling AppSec book: https://amzn.to/3pGO4Vz
Check out my behind-the-scenes newsletter: https://www.andrewhoffman.me/newsletter/
Read More on Log4Shell (Log4J):
1. https://www.lunasec.io/docs/blog/log4j-zero-day/
2. https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592
3. https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce
Log4Shell (aka the RCE of Log4J) is one of the biggest recent vulnerabilities reported in OSS software. It affects potentially hundreds of thousands of websites, rendering each of them vulnerable to a complete takeover with nothing but an HTTP request required to exploit.
Видео What is Log4Shell (Log4J RCE) and why does it matter? канала Andrew Hoffman
Check out my best selling AppSec book: https://amzn.to/3pGO4Vz
Check out my behind-the-scenes newsletter: https://www.andrewhoffman.me/newsletter/
Read More on Log4Shell (Log4J):
1. https://www.lunasec.io/docs/blog/log4j-zero-day/
2. https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592
3. https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce
Log4Shell (aka the RCE of Log4J) is one of the biggest recent vulnerabilities reported in OSS software. It affects potentially hundreds of thousands of websites, rendering each of them vulnerable to a complete takeover with nothing but an HTTP request required to exploit.
Видео What is Log4Shell (Log4J RCE) and why does it matter? канала Andrew Hoffman
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Command Injection ExplainedThe Strange World of Quines: Algorithms that Generate ThemselvesHow to Not Get Hacked - 5 Rules Explained by White Hat HackerDefeating Google's XSS Game | Level 6: Follow the white rabbitTwitch Hack Exposed: Passwords, AWS Secrets, YouTube/Facebook Keys & MoreWhy is (EMPTY_ARRAY) equal to (NOT_EMPTY_ARRAY) in JavaScript?The Newest Way to Learn AppSec!Channel Reboot: Big Changes IncomingWhat happens if you add two booleans in JavaScript?Defeating Google's XSS Game | Level 5: Breaking protocolZero Trust Architecture ExplainedTrusted Types Explained [With Live Coding Demo]Why is there is a special JavaScript object that both exists and does not exist - at the same time?SQL Injection ExplainedMass Assignment Attacks ExplainedHow to Write a Best-Selling Book (Step by Step Tutorial from an Author)Stored Cross-Site Scripting (Stored XSS) ExplainedHow to Find and Read a Bill (US Congress)MidJourney vs DALL-E 2 Detailed ComparisonReflected Cross-Site Scripting (Reflected XSS) Explained