Dec. 6, 2023, 5:07 p.m. | Vicky Aryan

InfoSec Write-ups - Medium infosecwriteups.com

Photo by Florian Klauer on Unsplash

This post will explain and walk through the exploitation of the recently discovered vulnerability, CVE-2021–44228, that affects the Java logging program Log4J. This vulnerability, which provides remote code execution on hosts using software that makes use of the log4j program, has a severity level of 10.0, making it classified as most critical. Another name for this exploit is “Log4Shell.”

Table of Content

  1. Log4jShell
  2. What is log4j
  3. What is LDAP and JNDI
  4. LDAP and JNDI …

cybersecurity hacking log4j

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Principal Business Value Consultant

@ Palo Alto Networks | Chicago, IL, United States

Cybersecurity Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Penetration Testing Engineer- Remote United States

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Internal Audit- Compliance & Legal Audit-Dallas-Associate

@ Goldman Sachs | Dallas, Texas, United States

Threat Responder

@ Deepwatch | Remote