Easy Log4J Exploit Detection with CanaryTokens | HakByte

Поделиться
HTML-код
  • Опубликовано: 15 дек 2024
  • НаукаНаука

Комментарии • 37

  • @userhandler0tten351
    @userhandler0tten351 3 года назад +2

    Thanks for this succinct instructional. Definitely going to use this in my lab, and then hopefully at work

  • @l0gcat_
    @l0gcat_ 3 года назад +3

    2021 ended with a blast

  • @cloudnsec
    @cloudnsec 3 года назад +2

    What a way too end the year, great content!

  • @vonniehudson
    @vonniehudson 2 года назад

    Anyone else notice the video length is 13:37… which is pretty leet?

  • @OcteractSG
    @OcteractSG 2 года назад +3

    I imagine that this sort of thing might be a malware payload so that attackers can get innocent people to do recon for them, essentially masking their presence and causing additional chaos.

  • @tobijames4698
    @tobijames4698 2 года назад +1

    Awesome!!! Btw, do u remember me from ur maker portfolio A year ago? Time flies 😊😊😊😊

  • @c1ph3rpunk
    @c1ph3rpunk 2 года назад

    Yea, this was a really nice 144 hour day while I was on vacation. So much fun.

  • @OneAndOnlyZekePolaris
    @OneAndOnlyZekePolaris 2 года назад

    How to delete our tokens?

  • @AnkerPeet
    @AnkerPeet 3 года назад +2

    Are any of you messing with the canary token website? It won't load for me.

  • @warrior3d27
    @warrior3d27 2 года назад

    hey alex, was canarytoken still working? i heard it had broke or something

  • @fedupgamer9075
    @fedupgamer9075 3 года назад +2

    Watching this while eating my HAXOR Flakes.

  • @raymondsabee
    @raymondsabee 2 года назад

    Great video, keep up the good work!

  • @governgv.greygrey4928
    @governgv.greygrey4928 3 года назад +1

    Also you should do a video on SDR type diy builds like the other ones you have done with say, the deauther or wifi ducky, something to send 5ghz or more at the max, with a screen, and maybe go nuts and add a few other projects like the two mentioned all in one, call it the iHAC ;)

  • @TrollingAround
    @TrollingAround 3 года назад +5

    Two things: 1. How the hell did the programmers of log4j not foresee this? 2. Good to see your ears.

    • @Truesilverful
      @Truesilverful 3 года назад +1

      Also this has been there for so many years. I think since 2012.

    • @jaaguar13
      @jaaguar13 2 года назад +1

      Not all programmers come with cyber security in mind. They just concentrate either on their task itself or on business case in general. But they do not think how their feature can be attacked. So log4j was made with some weird use case where there was a need to get some stuff from remote server. And like this JNDI lookup was added to a simple logger.
      And as it is just a logger then few people show an interest towards what is going inside it. If it logs the stuff, then it is good to go. End user is satisfied. Different from some online game where end user can notice all kind of weird bugs and then reports them to the developers for fixing. Logger is just so simple. It does one job: logs. OK, it is possible also to modify logs, but in general one job. And with one job it is difficult to go wrong. So end user is not noticing any bugs and not doing any bug reports to the developer. And like this this vulnerability remained in the logger for so many years before somebody took time to mess around with it and found this vulnerability.

    • @TheoGottwald
      @TheoGottwald 2 года назад +2

      Normally they get visitors from Agencies with 3 letters asking them to built something in for them and forget about it.
      Of course there are advantages ... doing what they say. On the other side - you have no choice doing something else.
      I have heared quite some people making software telling me such stories. Especially if you software is able to really protect something FROM THEM.

    • @c1ph3rpunk
      @c1ph3rpunk 2 года назад

      How did they not see it? They didn’t know what to look for. They had a feature request, they worked it and nowhere in that process was security testing involved. Failure of imagination is the cause of MANY security lapses.

    • @flyguy31164
      @flyguy31164 2 года назад

      This JNDI remote code exploit was presented at the 2016 US BlackHat conference. Oh well!

  • @Wakeup-An-In-Light
    @Wakeup-An-In-Light 3 года назад

    So is this how their gonna take the internet temp offline?

    • @jaaguar13
      @jaaguar13 2 года назад

      It does not take the Internet offline. It just makes it vulnerable. So hackers can enter all kind of systems (simplified explanation) by will.

    • @alvallac2171
      @alvallac2171 2 года назад

      *they're (contraction of "THEY aRE")
      their: for possession
      there: for all other uses

  • @old2235
    @old2235 3 года назад

    Nice and well informative.

  • @ZayedAlhashmi-bb1cu
    @ZayedAlhashmi-bb1cu Год назад

    Is it illegal?

  • @dw524451
    @dw524451 3 года назад

    This is like honey trap right the canary token?

  • @arvindkrishna5300
    @arvindkrishna5300 2 года назад

    Superb.

  • @OneAndOnlyZekePolaris
    @OneAndOnlyZekePolaris 2 года назад

    Why you blur Admin and Password if you going to say it anyways?... Also we won't be logging into it.

  • @jmr
    @jmr 3 года назад +3

    I've been hunting for log4j issues. It sucks!!!

    • @old2235
      @old2235 3 года назад +1

      What challenges are you having?

    • @jmr
      @jmr 3 года назад +1

      @@old2235 Just a real pain hunting down everything that might be vulnerable. Then hoping the update isn't a problem. Then I had a server mysterious freak out and started wondering... Did I miss something? I completely reinstalled everything fresh and it started bogging down again. To the point I couldn't even SSH in. I got everything working right now.

    • @old2235
      @old2235 3 года назад +2

      @@jmr sorry to hear that, if you want to collab do let me know. I remember there's is bypass on the new fix for log4J do check that one out.

    • @jmr
      @jmr 3 года назад +1

      @@old2235 Thanks, I'm pretty sure I've got it worked out.

    • @Truesilverful
      @Truesilverful 3 года назад +1

      Ye, same here, it was a crazy week when this was announced. So many applications and servers use this.

  • @kakishare9237
    @kakishare9237 3 года назад

    nice

  • @bdk8833
    @bdk8833 3 года назад +1

    1337

  • @governgv.greygrey4928
    @governgv.greygrey4928 3 года назад

    Yoooo. I’m number 5 and it got 900 views..
    Guys..
    I did it.
    I saw Haley’s comet in RUclips tonight,
    Also if you would like to know a secret that will CHANGE. YOUR. LIFE.
    ....ever heard of NFT’s..?