Guys, this is Venkat Raman V, welcome to my course on Verifying Log4j2 Vulnerability and Applying Fixes, in this course helps you easy way to identify if any of your applications are using Log4j2 and how to fix it.
Important Information about this training:
•No reading from presentation, the architecture, the diagrams are self made all those words in your PDF too.
•Only on Linux prod like environment using SSH terminal no GUI (only for browser, windows o/s will be used)
•No Linux experience needed,
•Commands and method of execution is given in the video & PDF is attached for the commands,
•Just follow the video and work in your environment.
About The Course:
A critical exploit in widespread Java library has been found, disrupting much of the internet as server admins scramble to fix it. The vulnerable component, log4j, is used everywhere as an included library, so you will need to check your servers and make sure they’re updated.
As far as exploits go, the log4j vulnerability is by far one of the worst in the last few years, scoring a rare 10/10 on the CVSS scale, and is going to haunt the entire internet for many years to come.
What’s worse is that log4j isn’t an application—it’s an open source library used by many other applications. You may not have it installed directly; it might be included in other .jar files, or installed by other applications as a dependency.