Главная
Study mode:
on
1
Intro
2
Log4J
3
What is Log4J
4
How did this all play out
5
Mitigations
6
Ingress
7
Risk Reward
8
Flowon Effect
9
Vulnerability vs Exploit
10
The Exploit
11
Whats Next
12
Conclusion
Description:
Dive into an in-depth security flash covering the Log4Shell vulnerability, one of the most severe Java vulnerabilities in recent years. Explore the intricacies of Log4J, understand its significance, and trace the timeline of events surrounding this critical security issue. Learn about essential mitigation strategies, analyze the ingress points, and evaluate the risk-reward balance. Examine the flow-on effects, distinguish between vulnerability and exploit, and gain insights into the exploit itself. Conclude by discussing future implications and preparing for potential security challenges ahead in this informative 28-minute video from Bugcrowd featuring experts Casey and Adam.

Log4Shell - The Worst Java Vulnerability in Years

Bugcrowd
Add to list
0:00 / 0:00