alaniz.io

View Original

Log4Shell / Log4j Explained - Details and References

Cloudflare: “Because of the widespread use of Java and Log4j, this is likely one of the most serious vulnerabilities on the Internet since both Heartbleed and ShellShock.”

I’ve attempted to wade through the FUD and put together a consolidated list of useful resources related to the Log4J aka Log4Shell incident and vulnerability.

Florian Roth (@cyb3rops): https://github.com/Neo23x0/Fenrir/releases

Fastly: https://www.fastly.com/blog and https://www.fastly.com/blog

Kevin Beaumont (@GossiTheDog) Tweeted: https://twitter.com/GossiTheDog/status/1469807319865348096 and https://twitter.com/GossiTheDog/status/1469248250670727169

Cloudflare: https://blog.cloudflare.com/blog

GitHub resources list: https://gist.github.com/SwitHak/

CISA: https://www.cisa.gov/news

Jacob Williams https://twitter.com/MalwareJake/status/1470416041281007622?s=20

List of resouces from Reddit: https://www.reddit.com/r/blueteamsec

Google Cloud Blog: https://cloud.google.com/blog

Joshua Bregler: https://www.linkedin.com/posts/breglercissp_infographic-log4j-log4j2-activity-6876680855922712576-dRGU

Rob Fuller: https://www.linkedin.com/posts/mubix_log4shell-log4j-management-activity-6876536157119897600-nacC