У нас вы можете посмотреть бесплатно Log4j Vulnerability (Log4Shell) Explained In Hindi | CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Topic: Everything About Log4j & Log4Shell Vulnerability | Part - 1 | Bug Bounty Tutorial In this video, I've explained the Root Cause of Log4Shell Vulnerability, which is found in Log4j (Java Logging Library). I've tried my best to explain you about Log4j, JNDI, LDAP, Log4j Lookup, JNDI Lookup, etc in layman language using Simple 2D Animation. We will be covering this video in Two Parts and This is Part -1 of Log4j. By the end of this video, you will have solid understanding of this vulnerability. ► Timestamp: 00:00 - Video Agenda 01:13 - Basic Terminology (Log4j, JNDI, LDAP, Lookups, etc) 01:28 - What is & Why to Use Log4j 01:39 - Benefits of Maintaining Logs 02:38 - Why Not Manual File Handling I/O ? Why Log4j ? 04:42 - Log4j Lookup Plugin 05:48 - Log4j JNDI (Java Naming & Directory Interface) Lookup Plugin 06:55 - LDAP Usage Case Scenario 07:27 - Digest Everything as Story (Quick Recap) 08:32 - Log4Shell Issue Arises From Here 11:00 - Twist In The Story 11:33 - CVE-2021-45046 (Log4j JNDI Rule Bypass Explained) 13:11 - CVE-2021-45105 (Log4j Application Level DOS Explained) 13:31 - How To Mitigate (Fix) These Vulnerabilities 14:23 - Lesson for Developers 15:16 - End Enjoyed The Video! Why Not to Subscribe Us? ► GitHub: https://github.com/PushpenderIndia ► Telegram Channel: https://t.me/CyberAcademyHindi ► Medium: / pushpenderindia Thanks for watching! #BugBounty#Log4j#Explained