SecOps Tools and 2021 Security Incidents: Log4Shell Exploit

Cybersecurity    |    Intermediate
  • 12 videos | 1h 4m 6s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 3 users Rating 4.3 of 3 users (3)
Cybersecurity professionals are often tasked with studying breaches that have impacted other organizations to protect their assets. This knowledge helps identify potential threats and understand how threat actors operate in a modern environment. In this course, we begin by exploring the background of the Log4Shell exploit and how it was discovered. We then explore how the exploit was disclosed and various tools that can be used to scan for the vulnerability. We even look at how to conduct the exploit ourselves. Finally, we discuss the patches and response to the exploit by the open-source community and the long-term political and cybersecurity fallout. Upon completion of this course, you'll be able to describe the tools used to detect and conduct a Log4Shell exploit.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline the background of the attack and what made it possible
    Outline how the attack was discovered and disclosed
    Identify the tools available to detect and exploit log4j vulnerabilities
    Use metasploit to scan for log4j vulnerable servers
    Scan your network using log4j-scan
  • Configure a netcat listener to exploit log4j
    Use the python web server to distribute files
    Conduct a full attack using netcat, python web server, and log4shell
    Recognize the patches used in the response undertaken by the open-source community
    Recognize the political and cybersecurity community fallout from the log4j event
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 58s
  • 5m 53s
  • Locked
    3.  Attack Discovery
    5m 5s
  • Locked
    4.  Log4j Detection and Exploitation Tools
    5m 24s
  • Locked
    5.  Scanning for Log4Shell with Metasploit
    6m 56s
  • Locked
    6.  Scanning for Log4Shell with Targeted Scan Tools
    8m 31s
  • Locked
    7.  Configuring and Running Netcat Listener
    5m 14s
  • Locked
    8.  Distributing Files with Python Web Server
    4m 35s
  • Locked
    9.  Exploiting Log4Shell to Get a Reverse Shell
    8m 58s
  • Locked
    10.  Patches and Response
    5m 50s
  • Locked
    11.  Log4j Fallout
    5m 43s
  • Locked
    12.  Course Summary
    1m 1s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 12 users Rating 4.5 of 12 users (12)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.8 of 14 users Rating 4.8 of 14 users (14)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 15 users Rating 4.6 of 15 users (15)
Rating 4.6 of 171 users Rating 4.6 of 171 users (171)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)