Detecting Log4j Exploit with Snort | TryHackMe Snort Challenge

Поделиться
HTML-код
  • Опубликовано: 21 окт 2024

Комментарии • 9

  • @nomislava
    @nomislava Год назад +3

    Just for clarity, rev. Is for keeping track of the individual rules revision and does not have to be unique.

  • @killerbees1199
    @killerbees1199 Год назад +2

    your videos are so helpful

  • @mrdinkh3209
    @mrdinkh3209 Год назад

    For local rule six you can also leave the content in Hex and use Nocase rule option after content. The issue arrises with having the message say GET and not disabling case sensitvity.

  • @ian230187
    @ian230187 2 года назад

    Hi Motasem,
    For log4j section, the observation for @25:01 is that if we create a rule using IP protocol number of packets differ when compared to tcp protocol

  • @lucidox
    @lucidox Год назад +1

    Just spent 30mins trying to do the dsize one but I was editing the local-1.rules in a different folder! Ugh! Dumb

  • @promy171
    @promy171 2 года назад

    Sir could you make a video about industrial control system pentestin

  • @enesgulcek
    @enesgulcek Год назад

    thank you
    how can i easily extract the base64 encoded string?

    • @MrMemorybit
      @MrMemorybit Год назад

      you should be able to extract it from the log file via snort -r snort.log.12345678 -K ascii ( whatever number your log file is... I cannot recall exactly the code but that's pretty close) you should be able to copy and paste the Base64

    • @enesgulcek
      @enesgulcek Год назад

      @@MrMemorybit Thank you