Let's get some hands-on with Log4j! Download the pcap in the description and follow along. We'll look at how the attack works, how to filter for it, and how to config Wireshark to see where it is coming from. Hope you all enjoy and thank you so much for watching! I appreciate the comments and feedback.
@KaySwiss212 жыл бұрын
I'm curious to know what you think about Intel ME. There's some claims that ME is spyware from Intel. Do you think it's more of a risk or benefit to keep ME, being there's a way to disable it with me_cleaner
@plushplush76352 жыл бұрын
thanks bro
@Devopscreator2 жыл бұрын
Hi Chris, It's been 2 years since I started following you. Thanks for making such great video and your video are always to the point, short, simple and easy to understand. No one has explained the Wireshark better than you do. And it really helped in troubleshooting network issues.
@ChrisGreer2 жыл бұрын
I appreciate that! Thanks for the comment!
@yogeshkhurana50142 жыл бұрын
I am in TAC for a switch company. This came to us as an vulnerability issue with device. But thankfully no device was vulnerable. And from video I got chance to know about this attack. Thank you..
@ChrisGreer2 жыл бұрын
Great to hear. Thanks for the feedback!
@clementyves61542 жыл бұрын
Very nice video ! Good references and a lot of stuff learned again ! thanks for your job.
@ChrisGreer2 жыл бұрын
Thanks!
@vq8gef32 Жыл бұрын
Amazing Chris. As always awesome. I liked the way you checked to make sure the server hasn't reacted. (was my question)
@hackebeil202 жыл бұрын
Chris, sincerely, there has not been a single video from you that didn't provide massive value to me! Just learned about cyberchef and virustotal - great tools, man!
@ChrisGreer2 жыл бұрын
Awesome! Yeah those two are VERY useful. Glad the video helped. I'll be posting another as soon as I can get my hands on that script. Stay tuned!
@NarendraS2 жыл бұрын
You are AMAZING!!!!! The quality and the content and the way you explain is top notch
@ChrisGreer2 жыл бұрын
Thank you!
@309Jolly2 жыл бұрын
Thanks for the info. We are bombarded with tickets and I can now understand whats cooking in the backend
@ChrisGreer2 жыл бұрын
Glad it was helpful! More to come about this vuln as I get more pcaps.
@vnthks2 жыл бұрын
Thank you Chris, for providing such an incredible packet analysis. Keep up the great work.
@ChrisGreer2 жыл бұрын
Thanks, will do!
@letsgopacket44192 жыл бұрын
By watching your videos I realised how important the wireshark is..
@andyh39702 жыл бұрын
Excellent pace and details- 11/10 !
@ChrisGreer2 жыл бұрын
Thank you Andy!
@chrishuston44452 жыл бұрын
Amazingly helpful video, thank you for your time putting this together.
@hadestech81472 жыл бұрын
Chris, outstanding lesson. Thanks for the update.
@ChrisGreer2 жыл бұрын
My pleasure!
@TNothingFree2 жыл бұрын
Wonderful commentary, useful examples and short video. Very well done
@ChrisGreer2 жыл бұрын
Glad you liked it! Thank you for the comment.
@songtrush27112 жыл бұрын
Wow. I am flashed. This is great (and nicely cat assisted) content. Glad I discovered your channel.
@ChrisGreer2 жыл бұрын
😂 I was wondering when someone would comment on my cat.
@derrickdike57092 жыл бұрын
Another incredible video with a lot of knowledge to help with analysis. Thanks Chris
@ChrisGreer2 жыл бұрын
My pleasure Derrick!
@mystiqkc2 жыл бұрын
You are awesome. The way you explain things is clear and I feel excited to learn more. Thanks a lot for this. I have set a goal for myself to complete your Pluralsight courses for the coming holidays :-)
@ChrisGreer2 жыл бұрын
Awesome! Reach out if you have any questions.
@faran_siddiqui-d3t2 жыл бұрын
Wow just about to suggest you this idea. You read my mind sir !!
@ChrisGreer2 жыл бұрын
We were thinking the same thing... I just had to get my hands on the pcap!
@vyasG2 жыл бұрын
A ton of useful information in this video! Thank you.
@ChrisGreer2 жыл бұрын
Thanks Vyas!
@RyanBess2 жыл бұрын
Look forward to seeing the next video on log4j. I too want to see the shell code
@ChrisGreer2 жыл бұрын
Thanks for the comment Ryan. No kidding! I do too... as soon as I can get my hands on a clean, share-able pcap I will get the video out.
@DynastyKiller__2 жыл бұрын
This is awesome work, Chris. Thanks for this video.
@ChrisGreer2 жыл бұрын
Thanks for the comment Jorge!
@kiranjoshi67212 жыл бұрын
Thanks!
@ChrisGreer2 жыл бұрын
Thank you so much Kiran!
@venkatesh47602 жыл бұрын
Hey Chris thanks for this great informative video ..
@shawn81632 жыл бұрын
This is exactly right and if this was successful you could see the same dest port outbound as in the Jdni request in your example 1389
@ChrisGreer2 жыл бұрын
Nice detail! Thanks for sharing.
@vishalpandita98572 жыл бұрын
Very helpful video with simple explanation. Thanks!
@ChrisGreer2 жыл бұрын
Glad it was helpful!
@jjames72062 жыл бұрын
That's very useful, so smart!! Chris
@ThePumbaadk2 жыл бұрын
Thanks Chris, this was great and with very good explanations
@ChrisGreer2 жыл бұрын
Thank you!
@alandoran2 жыл бұрын
Thanks for sharing this Chris. Very helpful.
@ChrisGreer2 жыл бұрын
Glad it was helpful!
@deepaknarayanan36192 жыл бұрын
Woww Most Needed Content for current Situation ❤️👌 Much Appreciated video
@ChrisGreer2 жыл бұрын
Thanks for the comment!
@joepereira86902 жыл бұрын
This is great. Thank you for sharing.
@ChrisGreer2 жыл бұрын
You are so welcome!
@petrprochazka78912 жыл бұрын
Thank you very much for such excelent video and very useful links.
@ChrisGreer2 жыл бұрын
You are welcome!
@msa32182 жыл бұрын
Thanks a lot from Egypt keep your great work !!
@ChrisGreer2 жыл бұрын
Thanks, will do!
@haogedeng88422 жыл бұрын
Very informative - thank you very much for sharing!!
@ChrisGreer2 жыл бұрын
Glad it was helpful!
@MrBitviper2 жыл бұрын
awesome video chris.. thank you so much
@GaryHammell2 жыл бұрын
Great explanations and pace!
@ChrisGreer2 жыл бұрын
Glad you liked it! It's always hard to strike a balance in pacing. Keep the advanced folks interested while not losing the new folks. Thank you for the comment.
@FRD-HDD2 жыл бұрын
Very insightful. Thank you.
@yuvarajlakshmanan7672 жыл бұрын
Great video at right time!. Thanks a lot.
@ChrisGreer2 жыл бұрын
Glad it was helpful!
@edisontan24402 жыл бұрын
Incredible video !👍🏻
@ChrisGreer2 жыл бұрын
Thanks a lot!
@peterborcik3222 жыл бұрын
Man ! You are really cool ! Best wireshark stuff ever ;-)👍👍👍
@peterborcik3222 жыл бұрын
I need one monitor extra for this wireshark map ;-)
@ChrisGreer2 жыл бұрын
Thanks! 👍
@zahidjaan13192 жыл бұрын
Good work, hope we will get more informative videos, like,subscribed !!
@ChrisGreer2 жыл бұрын
Thanks!
@FayOnis2 жыл бұрын
thank you for this video, very knowledgable
@ChrisGreer2 жыл бұрын
Thanks Fay!
@benhartsimbolon64572 жыл бұрын
Very nice video. Really like the explanation !!
@ChrisGreer2 жыл бұрын
Glad you liked it!
@Seansaighdeoir2 жыл бұрын
Great job Chris many thanks for this.
@ChrisGreer2 жыл бұрын
You are welcome! More to come as I get more pcaps!
@tweedle6342 жыл бұрын
Your content. is AMAZING. THANK YOU FOR THIS!!!!!
@ChrisGreer2 жыл бұрын
Glad you enjoy it!
@malkeetkalera75202 жыл бұрын
I'm waiting for this
@compeec2 жыл бұрын
Thank you Chris, Good explanation.
@ChrisGreer2 жыл бұрын
Glad it was helpful!
@triumphant_54 Жыл бұрын
hi Chris, i saw your Wireshark course on David Bombal Training platform. do you offer certification for it?
@wingman2k2 жыл бұрын
Wow this is such a great video
@ChrisGreer2 жыл бұрын
Thanks!
@roarman752 жыл бұрын
Well explained.. nice!
@kevinaltizer2 жыл бұрын
Great info Chris. Thanks.
@ChrisGreer2 жыл бұрын
Thanks for the comment Kevin!
@penguin--_--2 жыл бұрын
Hi Chris, Why my wireshark is only capturing 802.11 packets?
@ChrisGreer2 жыл бұрын
Hey - can you tell me a bit more about exactly what you see? by 802.11 do you mean control and mgt frames?
@ohkay89392 жыл бұрын
Awesome video, thank you.
@ChrisGreer2 жыл бұрын
Glad you liked it!
@dedkeny2 жыл бұрын
FYI the IP in the Base64 encoded message is still active... the IP may not be static but I found this interesting.
@ChrisGreer2 жыл бұрын
Hmmmm, nice. Thanks for the comment!
@chockalingamchidambaram19482 жыл бұрын
Thanks for the video. Very informative. Do you know what is in that script that this attack is trying to execute (which you said opens up a connection back to the attacking host). Did you get a copy of that lh.sh script?
@ChrisGreer2 жыл бұрын
Hey! This particular one wasn't captured. However I did get my hands on a pcap with a similar attack and the script was captured too. I'm prepping the content for that video now. Stay tuned!
@chockalingamchidambaram19482 жыл бұрын
@@ChrisGreer Thanks !
@JoeClyde579 Жыл бұрын
Great video
@SoulJah8762 жыл бұрын
Very cool video, thank you.
@ChrisGreer2 жыл бұрын
Glad you liked it!
@kevingendron55862 жыл бұрын
Excellent!
@ChrisGreer2 жыл бұрын
Many thanks! Glad you liked it!
@bhaskarmallarapu23922 жыл бұрын
Thank you, good video
@ChrisGreer2 жыл бұрын
Thank you too!
@KeaYeshua2 жыл бұрын
Nice one
@ShadyNetworker2 жыл бұрын
Thanks for making the video! Is there anything you can share about the shell script referenced?
@ChrisGreer2 жыл бұрын
Not much yet - but the more I learn the more I will share. Thanks for the comment!
@GiorgioCamozzi2 жыл бұрын
Very interesting! Would it be possible for the server being attacked to initiate a connection back to the malicious IP through UDP? Or is wget always with TCP? Because then the server wouldn't do a SYN (as far as I'm aware it doesn't with UDP) and we would also need to filter for UDP connections originating from the attacked server.
@ChrisGreer2 жыл бұрын
Hey Giorgio! So the server could totally start a stream back to the callback server, no rules against that. It may use another utility to do so however. I haven't tried using wget over UDP so I'm not sure on that one.
@GiorgioCamozzi2 жыл бұрын
@@ChrisGreer Thanks Chris!:)
@HariKrishna-mw2rr2 жыл бұрын
Thank you 😊
@ChrisGreer2 жыл бұрын
You're welcome 😊
@HashirrRoblox2 жыл бұрын
Chris you are a good teacher 😀 Question why my Wireshark don't show the option for map it is grayed out ?
@ChrisGreer2 жыл бұрын
Do you have the geoIP databases loaded?
@Abdelilahjghii2 жыл бұрын
Good ☺️
@ChrisGreer2 жыл бұрын
Thanks 😊
@washburnlane2 жыл бұрын
Thank you 🤘😎
@ChrisGreer2 жыл бұрын
No problem!
@chrismachabee31282 жыл бұрын
Thanks for the video. I'm a web designer. I have some Wireshark courses on thee shelf but, never got to them. watching an expert at the craft was very enliightening. It's funny too. I have been hearing of this Log4J thing I thought it was another language, until a day or so ago I hear that it is a malware. Not really my thing, but important nonetheless. I don;t think I would have been bored had you shared more details, but I understand. Can you tell by loking at that hack if it is s script kiddie or a major attempt? Thanks again.
@ChrisGreer2 жыл бұрын
Hey Chris thanks for the comment. I was able to get my hands on a pcap with more detail, so I plan to release a follow-on video soon. Stay tuned!
@chrismachabee31282 жыл бұрын
@@ChrisGreer Sure, sure, I subbed for sure. I have also a ethical hacker course. I really have to fit in with everything else I'm trying to wrap my head. We standing by.
@Avinashahn2 жыл бұрын
Nice
@germancastillo6812 жыл бұрын
Hi from Colombia @Chris, could you give us a clue on how to tshoot this in wireshark but not for http (port 80) but for https (port 443) conections?
@ChrisGreer2 жыл бұрын
Hey German, good question! So the outbound TCP SYN filter would still work. I would probably add "!ip.dst==10.0.0.0/8" or whatever my internal address range was. Just because even though I might miss lateral movement from the server, I would definitely catch anytime it is going external to connect to somebody out there. I'd also keep a close eye on the number of small https connections that are made and the payload sizes. The post is a TCP connection all its own and is just a quick exchange. If I saw that behavior, followed by the server connecting externally, that would be suspect.
@S2eedGH2 жыл бұрын
Thanks for great content, I tried GeoIP on Kali linux but when I click "open in browser" it shows blank page
@ChrisGreer2 жыл бұрын
I wonder if it is the way the file is being unzipped?
@majiddehbi91862 жыл бұрын
thx Chris just a question is it useful to the level of ccna200-301 thx
@ChrisGreer2 жыл бұрын
Great question. I think it is great info for a CCNA to know, but it will not be on the exam. As far as TCP and Wireshark goes, the exam is very light on the details.
@aga012 жыл бұрын
🔥
@AmazingJayB512 жыл бұрын
I downloaded the trace packet but how do you view or open it in WireShark?
@ChrisGreer2 жыл бұрын
I usually just double click it, or find it from within the Wireshark user interface.
@AmazingJayB512 жыл бұрын
@@ChrisGreer Thank you!
@plushplush76352 жыл бұрын
wooow so cool
@domagoj19zg2 жыл бұрын
Cool stuf
@TamazghaLandOfGod2 жыл бұрын
اللي جا من عند أمين رغيب Amine Raghib إعفط على جييييم نحسبكم 👍👍
@ChrisGreer2 жыл бұрын
Welcome!
@WokwithLan2 жыл бұрын
Wokwithlan here
@stadingschool90542 жыл бұрын
Pub rarib Amin😂😂
@saidibra92312 жыл бұрын
you are going very fast, try to explain slowly
@Black_Swan687612 жыл бұрын
Thank you so much, Chris, for sharing this video. You explained it very well. Much appreciated!!!