0 Comments

Ethical Hacking - Log4Shell The Complete Course

Ethical Hacking – Log4Shell The Complete Course

Ethical Hacking – Knowing, Identifying and Exploiting Log4Shell Vulnerabilities | Pentesting Methodology | Cybersecurity

On this course we will learn about what Log4Shell vulnerabilities are and how to identify and exploit this vulnerabilities in a security assessment point of view. We start by learning the theoretical concepts about this vulnerability. Then, we are going to create our hacking lab with virtualized environments. Here, we will use Oracle Virtual Box to create 3 virtual machines. The first virtual machine will be running Kali Linux and it will be our hacking machine, from which we will exploit Log4Shell vulnerabilities. The second virtual machine will be running Ubuntu Desktop and it will be one of the victims machine, which will be running a Log4Shell vulnerable web application. The third virtual machine will be running Windows 11 and it will be one of the victims machine, which will be running a Log4Shell vulnerable Minecraft Server.

What you’ll learn

  • Know what is Logging, Log4J and Log4Shell
  • Create a Virtual Hacking Lab
  • How to exploit Log4Shell – Step by Step
  • Exploit Log4Shell Locally on a Windows Environment (Minecraft Server)
  • Exploit Log4Shell Locally on a Linux Environment (Ubuntu Web Server)
  • Exploit Log4Shell Remotely
  • Create tunnels with Ngrok
  • Security Assessments and Pentesting Methodology
  • Identifying Log4Shell vulnerabilities manually and with automation
  • How to mitigate Log4Shell

You May Also Need This Course

Ethical Hacking and Penetration Testing Bootcamp with Linux

Complete Ethical Hacking Bootcamp 2022: Zero to Mastery

Red Team Ethical Hacking – Intermediate

Udemy screenshot
success 100%

Udemy Coupons May 2022


Extra day to save. Get courses for up to 85% off today

Regions: Global

Promotion Dates: 5/26/22 - 5/26/22

Click HERE to Get Udemy Coupons Code


Extra day to save. Get courses for up to 85% off today