all InfoSec news
What are the log4j vulnerabilities, and how did it function?
Dec. 6, 2023, 5:07 p.m. | Vicky Aryan
InfoSec Write-ups - Medium infosecwriteups.com
This post will explain and walk through the exploitation of the recently discovered vulnerability, CVE-2021–44228, that affects the Java logging program Log4J. This vulnerability, which provides remote code execution on hosts using software that makes use of the log4j program, has a severity level of 10.0, making it classified as most critical. Another name for this exploit is “Log4Shell.”
Table of Content
- Log4jShell
- What is log4j
- What is LDAP and JNDI
- LDAP and JNDI …
More from infosecwriteups.com / InfoSec Write-ups - Medium
Honeypots 101: A Beginner’s Guide to Honeypots
2 days, 2 hours ago |
infosecwriteups.com
No Dev Team? No Problem: Writing Malware and Anti-Malware With GenAI
2 days, 14 hours ago |
infosecwriteups.com
Devvortex Hackthebox Walkthrough
3 days, 3 hours ago |
infosecwriteups.com
Port Scanning for Bug Bounties
3 days, 3 hours ago |
infosecwriteups.com
Jobs in InfoSec / Cybersecurity
Social Engineer For Reverse Engineering Exploit Study
@ Independent study | Remote
Principal Business Value Consultant
@ Palo Alto Networks | Chicago, IL, United States
Cybersecurity Specialist, Sr. (Container Hardening)
@ Rackner | San Antonio, TX
Penetration Testing Engineer- Remote United States
@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700
Internal Audit- Compliance & Legal Audit-Dallas-Associate
@ Goldman Sachs | Dallas, Texas, United States
Threat Responder
@ Deepwatch | Remote