LetsDefend: Incident Response Log4j RCE Exploit Analysis

LetsDefend Log4j RCE Exploit walkthrough

Incident Response Life-Cycle

  • Preparation
  • Detection & Analysis
  • Containment, Eradication & Recovery
  • Lesson Learned

--

--

--

Security Researcher [RED&BLUE]

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

A Dead Man’s switch for your network

Giving Power Back To The Consumer

The Vision of Open Finance after the Launch of AOS 2.0

Everything You Need to Know About Open Source Monitoring Systems — Application License Compliance…

The Cyber Risk Assessment

The February Secret Ecosystem Roadmap is live!!!!

User Data Collection Update —

Caesar Ciphers — Decrypted!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Michael Koczwara

Michael Koczwara

Security Researcher [RED&BLUE]

More from Medium

Attack Analysis — Cobalt Strike C2 & Hancitor/Malware

Threat Detection & Hunting with Google Chronicle Security

BTLO: Log Analysis — Privilege Escalation

Threat Hunt Deep Dives: Get to Know Your Log — Pt. 1