Analyzing a Log4j Exploit with Wireshark (and how to filter for it) // Sample PCAP!

แชร์
ฝัง
  • เผยแพร่เมื่อ 31 ก.ค. 2024
  • The Log4j is quite the buzz these days - as it should be! There are lots of videos showing the code of how it works, but let's analyze how CVE-2021-44228 looks on the wire. You can download the pcap with the attack traffic and follow along with me here:
    bit.ly/Log4jAttack
    (Thanks Brad Duncan from malware-traffic-analysis.net!)
    As a side point - there is a possibility that the filter shown will show some false positives if the target server connects to other internal servers. Take that into account when analyzing the filter results!
    Link to video on how to configure Wireshark GeoIP: • Map IP Address Locatio...
    Other links:
    E-mail: packetpioneer@gmail.com
    Twitter: / packetpioneer
    Full Wireshark Cybersecurity Course - www.bit.ly/wiresharkhunt
    TCP Analysis Course - www.bit.ly/wiresharktcp
    == More On-Demand Training from Chris ==
    ▶Getting Started with Wireshark - bit.ly/udemywireshark
    ▶Getting Started with Nmap - bit.ly/udemynmap
    == Live Wireshark Training ==
    ▶TCP/IP Deep Dive Analysis with Wireshark - bit.ly/virtualwireshark
    == Private Wireshark Training ==
    Let's get in touch - packetpioneer.com/product/pri...
    Timestamps:
    0:00 Intro
    0:58 PCAP Overview
    1:32 Mapping the source IP's
    2:51 Analyzing the Log4j Post
    4:29 Decoding the Base64 with CyberChef
    5:35 Researching the remote server - Virus Total
    6:46 Filtering for Log4j
    9:40 Wrap-Up
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 151

  • @ChrisGreer
    @ChrisGreer  2 ปีที่แล้ว +18

    Let's get some hands-on with Log4j! Download the pcap in the description and follow along. We'll look at how the attack works, how to filter for it, and how to config Wireshark to see where it is coming from. Hope you all enjoy and thank you so much for watching! I appreciate the comments and feedback.

    • @KaySwiss21
      @KaySwiss21 2 ปีที่แล้ว

      I'm curious to know what you think about Intel ME. There's some claims that ME is spyware from Intel. Do you think it's more of a risk or benefit to keep ME, being there's a way to disable it with me_cleaner

    • @plushplush7635
      @plushplush7635 2 ปีที่แล้ว

      thanks bro

  • @Devopscreator
    @Devopscreator 2 ปีที่แล้ว +15

    Hi Chris,
    It's been 2 years since I started following you. Thanks for making such great video and your video are always to the point, short, simple and easy to understand. No one has explained the Wireshark better than you do. And it really helped in troubleshooting network issues.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +3

      I appreciate that! Thanks for the comment!

  • @vnthks
    @vnthks 2 ปีที่แล้ว +1

    Thank you Chris, for providing such an incredible packet analysis. Keep up the great work.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks, will do!

  • @NarendraS
    @NarendraS 2 ปีที่แล้ว +2

    You are AMAZING!!!!! The quality and the content and the way you explain is top notch

  • @chrishuston4445
    @chrishuston4445 2 ปีที่แล้ว +2

    Amazingly helpful video, thank you for your time putting this together.

  • @derrickdike5709
    @derrickdike5709 2 ปีที่แล้ว +1

    Another incredible video with a lot of knowledge to help with analysis. Thanks Chris

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      My pleasure Derrick!

  • @vq8gef32
    @vq8gef32 ปีที่แล้ว

    Amazing Chris. As always awesome. I liked the way you checked to make sure the server hasn't reacted. (was my question)

  • @mystiqkc
    @mystiqkc 2 ปีที่แล้ว

    You are awesome. The way you explain things is clear and I feel excited to learn more. Thanks a lot for this. I have set a goal for myself to complete your Pluralsight courses for the coming holidays :-)

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Awesome! Reach out if you have any questions.

  • @clementyves6154
    @clementyves6154 2 ปีที่แล้ว +5

    Very nice video ! Good references and a lot of stuff learned again ! thanks for your job.

  • @andyh3970
    @andyh3970 2 ปีที่แล้ว +1

    Excellent pace and details- 11/10 !

  • @hackebeil20
    @hackebeil20 2 ปีที่แล้ว +12

    Chris, sincerely, there has not been a single video from you that didn't provide massive value to me! Just learned about cyberchef and virustotal - great tools, man!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +2

      Awesome! Yeah those two are VERY useful. Glad the video helped. I'll be posting another as soon as I can get my hands on that script. Stay tuned!

  • @Black_Swan68761
    @Black_Swan68761 2 ปีที่แล้ว

    Thank you so much, Chris, for sharing this video. You explained it very well.
    Much appreciated!!!

  • @DynastyKiller__
    @DynastyKiller__ 2 ปีที่แล้ว +1

    This is awesome work, Chris. Thanks for this video.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks for the comment Jorge!

  • @TNothingFree
    @TNothingFree 2 ปีที่แล้ว +1

    Wonderful commentary, useful examples and short video.
    Very well done

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Glad you liked it! Thank you for the comment.

  • @hadestech8147
    @hadestech8147 2 ปีที่แล้ว +1

    Chris, outstanding lesson. Thanks for the update.

  • @vyasG
    @vyasG 2 ปีที่แล้ว +2

    A ton of useful information in this video! Thank you.

  • @yogeshkhurana5014
    @yogeshkhurana5014 2 ปีที่แล้ว

    I am in TAC for a switch company.
    This came to us as an vulnerability issue with device.
    But thankfully no device was vulnerable.
    And from video I got chance to know about this attack.
    Thank you..

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Great to hear. Thanks for the feedback!

  • @venkatesh4760
    @venkatesh4760 2 ปีที่แล้ว +1

    Hey Chris thanks for this great informative video ..

  • @deepaknarayanan3619
    @deepaknarayanan3619 2 ปีที่แล้ว

    Woww Most Needed Content for current Situation ❤️👌 Much Appreciated video

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Thanks for the comment!

  • @vishalpandita9857
    @vishalpandita9857 2 ปีที่แล้ว +1

    Very helpful video with simple explanation. Thanks!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad it was helpful!

  • @ThePumbaadk
    @ThePumbaadk 2 ปีที่แล้ว +1

    Thanks Chris, this was great and with very good explanations

  • @alandoran
    @alandoran 2 ปีที่แล้ว

    Thanks for sharing this Chris. Very helpful.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad it was helpful!

  • @GaryHammell
    @GaryHammell 2 ปีที่แล้ว

    Great explanations and pace!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad you liked it! It's always hard to strike a balance in pacing. Keep the advanced folks interested while not losing the new folks. Thank you for the comment.

  • @songtrush2711
    @songtrush2711 2 ปีที่แล้ว +1

    Wow. I am flashed. This is great (and nicely cat assisted) content. Glad I discovered your channel.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      😂 I was wondering when someone would comment on my cat.

  • @309Jolly
    @309Jolly 2 ปีที่แล้ว

    Thanks for the info. We are bombarded with tickets and I can now understand whats cooking in the backend

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad it was helpful! More to come about this vuln as I get more pcaps.

  • @jjames7206
    @jjames7206 2 ปีที่แล้ว

    That's very useful, so smart!! Chris

  • @faran4536
    @faran4536 2 ปีที่แล้ว +1

    Wow just about to suggest you this idea. You read my mind sir !!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      We were thinking the same thing... I just had to get my hands on the pcap!

  • @petrprochazka7891
    @petrprochazka7891 2 ปีที่แล้ว

    Thank you very much for such excelent video and very useful links.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      You are welcome!

  • @MrBitviper
    @MrBitviper 2 ปีที่แล้ว

    awesome video chris.. thank you so much

  • @yuvarajlakshmanan767
    @yuvarajlakshmanan767 2 ปีที่แล้ว

    Great video at right time!. Thanks a lot.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad it was helpful!

  • @msa3218
    @msa3218 2 ปีที่แล้ว

    Thanks a lot from Egypt keep your great work !!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thanks, will do!

  • @benhartsimbolon6457
    @benhartsimbolon6457 2 ปีที่แล้ว

    Very nice video. Really like the explanation !!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad you liked it!

  • @FRD-HDD
    @FRD-HDD 2 ปีที่แล้ว

    Very insightful. Thank you.

  • @Seansaighdeoir
    @Seansaighdeoir 2 ปีที่แล้ว

    Great job Chris many thanks for this.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      You are welcome! More to come as I get more pcaps!

  • @edisontan2440
    @edisontan2440 2 ปีที่แล้ว +1

    Incredible video !👍🏻

  • @JoeClyde579
    @JoeClyde579 ปีที่แล้ว

    Great video

  • @tweedle634
    @tweedle634 2 ปีที่แล้ว

    Your content. is AMAZING. THANK YOU FOR THIS!!!!!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad you enjoy it!

  • @kevinaltizer
    @kevinaltizer 2 ปีที่แล้ว

    Great info Chris. Thanks.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Thanks for the comment Kevin!

  • @malkeetkalera7520
    @malkeetkalera7520 2 ปีที่แล้ว

    I'm waiting for this

  • @compeec
    @compeec 2 ปีที่แล้ว

    Thank you Chris, Good explanation.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad it was helpful!

  • @roarman75
    @roarman75 2 ปีที่แล้ว

    Well explained.. nice!

  • @peterborcik322
    @peterborcik322 ปีที่แล้ว

    Man ! You are really cool ! Best wireshark stuff ever ;-)👍👍👍

    • @peterborcik322
      @peterborcik322 ปีที่แล้ว

      I need one monitor extra for this wireshark map ;-)

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Thanks! 👍

  • @haogedeng8842
    @haogedeng8842 2 ปีที่แล้ว

    Very informative - thank you very much for sharing!!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad it was helpful!

  • @wingman2k
    @wingman2k 2 ปีที่แล้ว +1

    Wow this is such a great video

  • @joepereira8690
    @joepereira8690 2 ปีที่แล้ว +1

    This is great. Thank you for sharing.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      You are so welcome!

  • @FayOnis
    @FayOnis 2 ปีที่แล้ว

    thank you for this video, very knowledgable

  • @ohkay8939
    @ohkay8939 2 ปีที่แล้ว

    Awesome video, thank you.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad you liked it!

  • @zahidjaan1319
    @zahidjaan1319 2 ปีที่แล้ว

    Good work, hope we will get more informative videos, like,subscribed !!

  • @kiranjoshi6721
    @kiranjoshi6721 2 ปีที่แล้ว +3

    Thanks!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Thank you so much Kiran!

  • @RyanBess
    @RyanBess 2 ปีที่แล้ว

    Look forward to seeing the next video on log4j. I too want to see the shell code

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +2

      Thanks for the comment Ryan. No kidding! I do too... as soon as I can get my hands on a clean, share-able pcap I will get the video out.

  • @letsgopacket4419
    @letsgopacket4419 2 ปีที่แล้ว

    By watching your videos I realised how important the wireshark is..

  • @kevingendron5586
    @kevingendron5586 2 ปีที่แล้ว

    Excellent!

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Many thanks! Glad you liked it!

  • @bhaskarmallarapu2392
    @bhaskarmallarapu2392 2 ปีที่แล้ว

    Thank you, good video

  • @triumphant_54
    @triumphant_54 11 หลายเดือนก่อน

    hi Chris, i saw your Wireshark course on David Bombal Training platform. do you offer certification for it?

  • @SoulJah876
    @SoulJah876 2 ปีที่แล้ว

    Very cool video, thank you.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Glad you liked it!

  • @kealebogamoletsane977
    @kealebogamoletsane977 2 ปีที่แล้ว

    Nice one

  • @HariKrishna-mw2rr
    @HariKrishna-mw2rr 2 ปีที่แล้ว

    Thank you 😊

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      You're welcome 😊

  • @aga01
    @aga01 2 ปีที่แล้ว

    🔥

  • @ShadyNetworker
    @ShadyNetworker 2 ปีที่แล้ว

    Thanks for making the video! Is there anything you can share about the shell script referenced?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Not much yet - but the more I learn the more I will share. Thanks for the comment!

  • @washburnlane
    @washburnlane 2 ปีที่แล้ว

    Thank you 🤘😎

  • @HashirrRoblox
    @HashirrRoblox ปีที่แล้ว

    Chris you are a good teacher 😀 Question why my Wireshark don't show the option for map it is grayed out ?

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว

      Do you have the geoIP databases loaded?

  • @penguin--_--
    @penguin--_-- 2 ปีที่แล้ว +1

    Hi Chris, Why my wireshark is only capturing 802.11 packets?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Hey - can you tell me a bit more about exactly what you see? by 802.11 do you mean control and mgt frames?

  • @GiorgioCamozzi
    @GiorgioCamozzi 2 ปีที่แล้ว

    Very interesting! Would it be possible for the server being attacked to initiate a connection back to the malicious IP through UDP? Or is wget always with TCP? Because then the server wouldn't do a SYN (as far as I'm aware it doesn't with UDP) and we would also need to filter for UDP connections originating from the attacked server.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Hey Giorgio! So the server could totally start a stream back to the callback server, no rules against that. It may use another utility to do so however. I haven't tried using wget over UDP so I'm not sure on that one.

    • @GiorgioCamozzi
      @GiorgioCamozzi 2 ปีที่แล้ว

      @@ChrisGreer Thanks Chris!:)

  • @chockalingamchidambaram1948
    @chockalingamchidambaram1948 2 ปีที่แล้ว

    Thanks for the video. Very informative. Do you know what is in that script that this attack is trying to execute (which you said opens up a connection back to the attacking host). Did you get a copy of that lh.sh script?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      Hey! This particular one wasn't captured. However I did get my hands on a pcap with a similar attack and the script was captured too. I'm prepping the content for that video now. Stay tuned!

    • @chockalingamchidambaram1948
      @chockalingamchidambaram1948 2 ปีที่แล้ว

      @@ChrisGreer Thanks !

  • @majiddehbi9186
    @majiddehbi9186 2 ปีที่แล้ว

    thx Chris just a question is it useful to the level of ccna200-301 thx

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Great question. I think it is great info for a CCNA to know, but it will not be on the exam. As far as TCP and Wireshark goes, the exam is very light on the details.

  • @plushplush7635
    @plushplush7635 2 ปีที่แล้ว

    wooow so cool

  • @Avinashahn
    @Avinashahn 2 ปีที่แล้ว

    Nice

  • @shawn8163
    @shawn8163 2 ปีที่แล้ว

    This is exactly right and if this was successful you could see the same dest port outbound as in the Jdni request in your example 1389

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Nice detail! Thanks for sharing.

  • @germancastillo681
    @germancastillo681 2 ปีที่แล้ว

    Hi from Colombia @Chris, could you give us a clue on how to tshoot this in wireshark but not for http (port 80) but for https (port 443) conections?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Hey German, good question! So the outbound TCP SYN filter would still work. I would probably add "!ip.dst==10.0.0.0/8" or whatever my internal address range was. Just because even though I might miss lateral movement from the server, I would definitely catch anytime it is going external to connect to somebody out there. I'd also keep a close eye on the number of small https connections that are made and the payload sizes. The post is a TCP connection all its own and is just a quick exchange. If I saw that behavior, followed by the server connecting externally, that would be suspect.

  • @S2eedGH
    @S2eedGH 2 ปีที่แล้ว

    Thanks for great content, I tried GeoIP on Kali linux but when I click "open in browser" it shows blank page

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      I wonder if it is the way the file is being unzipped?

  • @AmazingJayB51
    @AmazingJayB51 2 ปีที่แล้ว

    I downloaded the trace packet but how do you view or open it in WireShark?

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว +1

      I usually just double click it, or find it from within the Wireshark user interface.

    • @AmazingJayB51
      @AmazingJayB51 2 ปีที่แล้ว

      @@ChrisGreer Thank you!

  • @chrismachabee3128
    @chrismachabee3128 2 ปีที่แล้ว

    Thanks for the video. I'm a web designer. I have some Wireshark courses on thee shelf but, never got to them. watching an expert at the craft was very enliightening. It's funny too. I have been hearing of this Log4J thing I thought it was another language, until a day or so ago I hear that it is a malware. Not really my thing, but important nonetheless. I don;t think I would have been bored had you shared more details, but I understand.
    Can you tell by loking at that hack if it is s script kiddie or a major attempt? Thanks again.

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Hey Chris thanks for the comment. I was able to get my hands on a pcap with more detail, so I plan to release a follow-on video soon. Stay tuned!

    • @chrismachabee3128
      @chrismachabee3128 2 ปีที่แล้ว

      @@ChrisGreer
      Sure, sure, I subbed for sure. I have also a ethical hacker course. I really have to fit in with everything else I'm trying to wrap my head. We standing by.

  • @dedkeny
    @dedkeny ปีที่แล้ว

    FYI the IP in the Base64 encoded message is still active... the IP may not be static but I found this interesting.

    • @ChrisGreer
      @ChrisGreer  ปีที่แล้ว +1

      Hmmmm, nice. Thanks for the comment!

  • @Abdelilahjghii
    @Abdelilahjghii 2 ปีที่แล้ว

    Good ☺️

  • @domagoj19zg
    @domagoj19zg 2 ปีที่แล้ว

    Cool stuf

  • @WokwithLan
    @WokwithLan 2 ปีที่แล้ว

    Wokwithlan here

  • @TamazghaLandOfGod
    @TamazghaLandOfGod 2 ปีที่แล้ว +1

    اللي جا من عند أمين رغيب Amine Raghib إعفط على جييييم نحسبكم 👍👍

  • @cansofcoke
    @cansofcoke 2 ปีที่แล้ว

    please update your chrome if you're not in a VM in this vid :D

    • @ChrisGreer
      @ChrisGreer  2 ปีที่แล้ว

      Thankfully in a VM :-) But still need to update. Good practice anyway!

    • @cansofcoke
      @cansofcoke 2 ปีที่แล้ว

      @@ChrisGreer chrome vulns just scare me so much, so I get triggered 😅

  • @stadingschool9054
    @stadingschool9054 2 ปีที่แล้ว

    Pub rarib Amin😂😂

  • @saidibra9231
    @saidibra9231 ปีที่แล้ว

    you are going very fast, try to explain slowly

  • @mystiqkc
    @mystiqkc 2 ปีที่แล้ว

    Thanks!