LOG4SHELL - A Zero Day you need to protect against TODAY

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ธ.ค. 2024

ความคิดเห็น • 38

  • @theycallmeken
    @theycallmeken 3 ปีที่แล้ว +18

    Farming turnips looks more attractive by day. Thanks for the vid 👨🏾‍💻

    • @cybercdh
      @cybercdh  3 ปีที่แล้ว +1

      haha, that's the dream.

    • @thingyee1118
      @thingyee1118 3 ปีที่แล้ว

      Yup

  • @kenbobcorn
    @kenbobcorn 3 ปีที่แล้ว +2

    As always Colin, fantastic video and nice deep dive depth. I've got to say I don't understand most of the details, but it gives me a pretty good idea that I've got lots to learn. Looking forward to your next reverse engineering analysis video with tools just like old times :D

    • @cybercdh
      @cybercdh  3 ปีที่แล้ว +1

      Thanks man! Likewise I’m looking forward to more of your content which I always enjoy.

  • @dunningkruger6075
    @dunningkruger6075 3 ปีที่แล้ว +7

    so if java is not installed on a system it's reasonable to assume the system is not vulnerable?

    • @sliceronsteam
      @sliceronsteam 3 ปีที่แล้ว +1

      A ton of services might pack in their own preferred version of java so it might not be as simple as making sure java is not installed system-wide.

  • @TKomoski
    @TKomoski 3 ปีที่แล้ว +3

    Thanks Colin Happy Holidays

    • @cybercdh
      @cybercdh  3 ปีที่แล้ว +2

      Likewise to you too.

  • @mytechnotalent
    @mytechnotalent 3 ปีที่แล้ว +3

    Thank you Colin. As always your analysis is most mature and extensive. Thank you for your breakdown and careful and brilliant analysis my friend! I am most concerned how embedded this threat is and how wide-spread it is. Apache is everywhere and RCE is such a serious threat. I wonder how long this zero-day has been known by Threat Actors? Nonetheless thank you and I am hoping everyone properly updates their infrastructure accordingly.

    • @cybercdh
      @cybercdh  3 ปีที่แล้ว +1

      Thanks Kevin, keep well and wishing you a peaceful Xmas.

    • @mytechnotalent
      @mytechnotalent 3 ปีที่แล้ว +1

      @@cybercdh You too!

  • @maximilian19931
    @maximilian19931 3 ปีที่แล้ว +3

    Better mitigation is removal of Java and looking for other vendor Implementation(mostly runtime)

    • @cybercdh
      @cybercdh  3 ปีที่แล้ว +1

      It’s surprising how much Java is still very much under pinning so many platforms.

    • @Mackenzieadventures1
      @Mackenzieadventures1 3 ปีที่แล้ว +1

      Java is still everywhere, especially if you support SAP.:)

    • @joshallen128
      @joshallen128 3 ปีที่แล้ว

      Openjdk

    • @sliceronsteam
      @sliceronsteam 3 ปีที่แล้ว

      So if your company has billions of dollars at stake and millions of lines of code running, just turn it all off and take a nap.

  • @atol71
    @atol71 3 ปีที่แล้ว

    Does Oracle use log4j for Java VM/JDK development and could the whole Java environment be compromised? Did they use Java tools (with log4j) for Oracle database development?

  • @bowdej02
    @bowdej02 3 ปีที่แล้ว +2

    Thanks Colin, great video!

    • @cybercdh
      @cybercdh  3 ปีที่แล้ว

      Cheers dude, hope you’re well.

  • @tonysanderson7741
    @tonysanderson7741 3 ปีที่แล้ว

    Colin, seeing 2.22 as the version we have installed , slightly confused if that version is simply a misenturpreted 2.2 therfore < than 2.15 or actually later version than 2.15. is there any way of knowing?

  • @haxguy0
    @haxguy0 3 ปีที่แล้ว +2

    Thank you for breaking this down

  • @angrybird29
    @angrybird29 3 ปีที่แล้ว +4

    Thanks for this informative breakdown

    • @cybercdh
      @cybercdh  3 ปีที่แล้ว +1

      Glad it was helpful!

  • @atol71
    @atol71 3 ปีที่แล้ว

    The British NCSC directed to ask Oracle and NO ANSWER from USA equivalent....

  • @0558tidyboy
    @0558tidyboy 3 ปีที่แล้ว +3

    Thanks for great video !!

  • @Nologogo
    @Nologogo 3 ปีที่แล้ว +1

    thanks for the post. Very much appreciated.

  • @ponderednamefordays6704
    @ponderednamefordays6704 3 ปีที่แล้ว

    Super interesting video! I'd love to see a breakdown of the NSO zero click imessage exploit. I read the google project zero blog post on it but can't wrap my head around the virtual CPU part.

    • @cybercdh
      @cybercdh  3 ปีที่แล้ว

      Yeh for sure, that exploit is from a different planet.

  • @HackeXPlorer
    @HackeXPlorer 3 ปีที่แล้ว +1

    As always, informative and to the point , tHANkYou.

  • @fireyonix
    @fireyonix 3 ปีที่แล้ว

    thank you for breaking it down

  • @ronaldinojikri5682
    @ronaldinojikri5682 3 ปีที่แล้ว +1

    Why don’t companies write their own logger instead of using these bloated pieces of $hit.

  • @Krisztyan
    @Krisztyan 3 ปีที่แล้ว

    is log4j1 effected?

  • @rey82rey82
    @rey82rey82 3 ปีที่แล้ว

    Error

  • @davejoseph5615
    @davejoseph5615 3 ปีที่แล้ว

    Once again a stupid and unnecessary added "feature" creates a security nightmare.

  • @bee6431
    @bee6431 3 ปีที่แล้ว +1

    i dislike

  • @Corcontv
    @Corcontv 3 ปีที่แล้ว +3

    ...teeth...