Log4J Exploit Explained: How it Works, In-Depth Examples, Mitigation, etc. | Log4Shell Vulnerability

Sdílet
Vložit
  • čas přidán 10. 07. 2024
  • 1:1 Coaching & Resources/Newsletter Sign-up: withsandra.square.site/
    Join our Discord :D - / discord
    Patreon (Cyber/tech-career resources) ♡: / withsandra
    Sign up for our email newsletter: withsandra.square.site/email-...
    Hacker Merch: www.redbubble.com/people/Hack...
    Ransomeware Attack: • Ransomeware Cyber Atta...
    OWASP Top 10 Security Vulns: • Top 10 Web App Securit...
    SOC Analyst: Explained: • What does a SOC Analys...
    How I learned to Hack: • How I Learned How to H...
    Career Q&A: • Career Q&A (Cyber Secu...
    How I passed my Security+ certification exam: • How I Passed Security+...
    Security engineers Vs Security analysts: • Cyber Security Analyst...
    Coding/cyber bootcamps: Worth it?: • Can you Find a Job Wit...
    Bug bounties for beginners: • How to Get Started wit...
    How I Learned How to Code: • How I Learned How to C...
    Highest paid tech jobs: • Highest Paying Jobs in...
    How much does cyber security pay: • Cyber Security Pay | H...
    Why you should learn to code: • Should You Learn How t...
    Top 7 Coding Languages for Cyber Security: • Top 7 Coding Languages...
    Watch next :) -
    How to get your first cyber security job: • How to find an entry l...
    Why go into cyber security: • Why go into Cyber Secu...
    Why you shouldn’t go into cyber security: • Why You Shouldn’t Choo...
    Resume That Got Me My First Cyber Security Job: • Critiquing My Resume |...
    How to get started in cyber security with no experience: • How to get a job in cy...
    Top 7 Skills for Cyber Security: • Top 7 Skills for Cyber...
    Top 7 Cyber Security Conferences: • Top 7 Cyber Security C...
    Security Analyst work vlog: • Video
    Cyber Security Interview Prep: • Cyber Security Intervi...
    Top 7 Jobs in Cyber Security: • Best Cyber Security Jo...
    The SWE vs Cyber series:
    Which should I choose - Cyber Security or Software Development?: • Choosing Between Softw...
    Cyber Security vs Software Engineer: • Cyber Security vs Soft...
    SWE Resume vs Cyber Security Resume: • Cyber Security vs Soft...
    ------------------
    Hey there :) - thanks for watching!
    I post videos every Wednesday and Sunday, please subscribe, like, and share if you enjoyed this video! It really supports me and if there are any videos you’d like to see from me, please feel free to drop it down in the comments below and I’ll try my best! ⇩♡
    Support the channel ♡ : / withsandra
    1:1 Coaching: withsandra.square.site/
    Sign up for my email newsletter: withsandra.square.site/email-...
    ❈ Connect with me ❈
    Vlog Channel: czcams.com/channels/eo2.html...
    Blog: www.withlovesandra.com/
    Twitch: / withlove_sandra
    Advice for Ambition Podcast (Available on any podcast platform):
    open.spotify.com/show/0TC8muD...
    My handmade jewelry: www.etsy.com/shop/aimijewelry
    ❈ Filming Equipment ❈
    Camera: amzn.to/3fh56mB
    Vlogging Camera: amzn.to/3ocw03s
    Phone Tripod: amzn.to/2BTAn0l
    Ring Light Tripod: amzn.to/2YpNKgx
    ❈ All my favorite products ❈
    www.amazon.com/shop/withlove....
    Buy me a coffee: ko-fi.com/lovesandraxo
    My amazon wishlist: www.amazon.com/hz/wishlist/ls...
    ❈ Discounts/Codes ❈
    Robinhood free stock: join.robinhood.com/sandral7
    Webull free stock: act.webull.com/n/AIpkhDAtMr2G...
    Wealthfront $5,000 invested free www.wealthfront.com/invited/A...
    Yotta Savings (100 free tickets) withyotta.page.link/nSa4S5yCY...
    Music: www.bensound.com
    Brand/collaboration inquiries: hello@withlovesandra.com
    Disclaimer: This video is not sponsored. Some links are affiliate links which means I earn a small commission if anyone decides to purchase through them. Thank you so much for your support!
    Timestamps:
    Intro (0:00)
    What exactly is log4j? (0:48)
    Explaining the exploit (log4shell) (1:48)
    How the attack works (technical) (5:52)
    Example attack using log4shell (7:42)
    Mitigations/patches for log4j (9:30)
    Tags: log4j vulnerability explained,log4j vulnerability explained 2021,log4shell vulnerability explained,log4shell vulnerability,log4j vulnerability,what is log4j,what is the log4j vulnerability,what is log4shell,what is the log4shell vulnerability,log4j exploit explained,log4j exploit explained 2021,log4shell exploit explained,log4shell exploit,log4j exploit,what is log4j,what is the log4j exploit,what is log4shell,what is the log4shell exploit,log4shell exploit,understanding the log4j vulnerability,understanding the log4j exploit,biggest exploits of 2021,biggest vulnerabilities of 2021,biggest vulnerability of 2021,biggest exploit of 2021
  • Věda a technologie

Komentáře • 50

  • @WithSandra
    @WithSandra  Před 2 lety +4

    Has your org been affected by the log4j exploit? What are some other big exploits you’d like me to cover? 💻💡

    • @dmarshall5877
      @dmarshall5877 Před 2 lety

      I have a question, is it essential for cybersecurity to learn how to build a website or software? or I just need to know how they work?

    • @tachometer-flac
      @tachometer-flac Před rokem

      Rockstar currently dealing with this issue. All this week many people playing GTA Online multiplayer have seen their characters stats modified such as money and level. Some people can't login. The launcher doesn't recognize their email. Rockstar Games sent out a Tweet that they are working on a fix.

  • @chikaacholonu4613
    @chikaacholonu4613 Před 2 lety +2

    I loved how you broke it down. I'd been trying to wrap my head around it for a week now...lol

    • @WithSandra
      @WithSandra  Před 2 lety

      Thank you for watching Chika! Yeah same haha I’ve been working through it this week but really tried to understand how it worked step by step before making this video, appreciate your support!

  • @uncleelder4922
    @uncleelder4922 Před rokem

    I viewed about 6 videos on log4j before this one. This one so far is the most useful and concise

  • @paulagiglio4461
    @paulagiglio4461 Před 2 lety +1

    This was a great explanation and very helpful. Thank you!

    • @WithSandra
      @WithSandra  Před 2 lety

      Thank you Paula! Glad it was helpful :)

  • @subhamroy5368
    @subhamroy5368 Před 2 lety +2

    Thanks for the detailed video 🔥

    • @WithSandra
      @WithSandra  Před 2 lety +1

      Thanks so much for watching! 😁

  • @themistoclesnelson2163

    Thank you for the explanation :) I appreciate it is much shorter than the others.

  • @seyznet7183
    @seyznet7183 Před 2 lety +1

    You’re so brilliant ❤️✨👏🏽

  • @indermatharu4671
    @indermatharu4671 Před 2 lety

    Great explanation, thank you!

  • @bjkorb7272
    @bjkorb7272 Před 2 lety

    Thanks for making this video!

    • @WithSandra
      @WithSandra  Před 2 lety

      Np thanks so much for watching!😁

  • @yungjohnathan1188
    @yungjohnathan1188 Před 2 lety

    Thorough explanation. Thanks 😎

    • @WithSandra
      @WithSandra  Před 2 lety

      Thanks so much for watching! 😁😁

  • @craigheard2504
    @craigheard2504 Před 2 lety

    Thank U Sandra. Great explanation. 👍🏽.

  • @Thejaslane91
    @Thejaslane91 Před 2 lety

    Glad you talked about this. Work has been atrocious this last week 🤯

    • @WithSandra
      @WithSandra  Před 2 lety

      Thanks for watching Jas! And same here LOL.. everyone I talked to this past week was roped into this exploit in someway, hopefully its only uphill from here!

  • @vulnerabilitycsrf
    @vulnerabilitycsrf Před 2 lety

    Thanks for the simple explanation and explanation of attack vectors. How should I format my home office for entry level SOC analyst: two screens, RAM requirements, 1 TB of storage?

  • @gurvirsingh4190
    @gurvirsingh4190 Před 2 lety

    Great explanation 🔥🔥

  • @melvinpatomendoza
    @melvinpatomendoza Před 2 lety +1

    Thanks!

    • @WithSandra
      @WithSandra  Před 2 lety +1

      Thanks so much for watching Melvin! 😁

  • @ankhcreations
    @ankhcreations Před 2 lety

    Thanks for sharing

    • @WithSandra
      @WithSandra  Před 2 lety

      Thanks so much for watching Andre! 😁

  • @johnczech7074
    @johnczech7074 Před 2 lety

    This was really interesting. Thank you beautiful lady and hope you guys are doing well!

    • @WithSandra
      @WithSandra  Před 2 lety

      Thank you so much for watching John! Appreciate your support as always :)

  • @AlexiMinko-Legault
    @AlexiMinko-Legault Před rokem

    Would this exploit explain why JS scripts with contents exhibiting malicious to suspicious behavior (remote control executions, hook api calls, calls an API to take screenshot etc...) might appear out of nowhere on a computer via drive accounts?

  • @jerryasagba7352
    @jerryasagba7352 Před 2 lety

    I would Love to watch you stream, but great video

    • @WithSandra
      @WithSandra  Před 2 lety +1

      Thanks so much for watching Jerry! :) Appreciate your support, and might consider streaming sometime next year haha

  • @ramiabed6716
    @ramiabed6716 Před 2 lety

    nice content , i have 5+ experience in IT support with sec+ network+ and ccna certificates , ist enough to get me started with cyber security ?

    • @johnwale5951
      @johnwale5951 Před 2 lety +2

      Aren’t you already qualified lol??

  • @rujotheone
    @rujotheone Před 2 lety

    This reminds me of shellshock. Simple but devastating

    • @WithSandra
      @WithSandra  Před 2 lety +1

      I agree! The worse part of it all is how easy it is for someone to point it to some malicious code they’re hosting at some url. Thanks so much for watching!

    • @rujotheone
      @rujotheone Před 2 lety

      @@WithSandra Welcome. If you really think about it, the exploit exists at the interface between two tech stacks . One wonders which other exploits can be created this way; by exploiting interfaces between 2 different technologies which independently are not insecure

  • @dx31900
    @dx31900 Před 2 lety

    What solutions you guys are using to prevent this?

    • @WithSandra
      @WithSandra  Před 2 lety

      Hi Muhammad, thanks for watching! The best recommendation is to download the latest patch from Apache

  • @Ravi-wi5gx
    @Ravi-wi5gx Před 2 lety

    Hi Sandra

    • @WithSandra
      @WithSandra  Před 2 lety +1

      Hi Yelamareddy! Thanks for watching 😁

  • @christophervasquez1330

    ugh, so much data and information about ourselves is out there.... *sigh*
    F*ck Ransomware.

  • @HarryPotter-qj2sp
    @HarryPotter-qj2sp Před 2 lety

    I never used log4j.

  • @Joonwebb89
    @Joonwebb89 Před 2 lety

    Thank you. Respectfully are u single. I am very interested in getting to know you.

    • @WithSandra
      @WithSandra  Před 2 lety +1

      Thanks for watching! I’m happily taken :)

    • @Joonwebb89
      @Joonwebb89 Před 2 lety

      @Super Mario Damn. Why u hating on love fam. Relax. I'm not ashamed to emote Super Mario.