Skip to content

Detection rules to look for Log4J usage and exploitation

License

Notifications You must be signed in to change notification settings

timb-machine/log4j

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Rolling 2 day view of updates from this repo

Kick banning attacks at the WAF

  • Block \$\{.+\}

Note: Some of the public WAF regular expressions out there are probably vulnerable to ReDoS. If you want to play, https://regex101.com/r/KqGG3W/3 is a decent playground but you want to keep the number of steps as low as possible.

Paths to check

UNIX

  • /opt
  • /usr/local
  • /home

OS X

(see also UNIX)

  • /Applications
  • /Library
  • /Users/*/Applications
  • /Users/*/Library

Windows

  • c:\Program Files
  • c:\Program Files (x86)
  • c:\Documents and Settings
  • c:\Users

Dirty checks

  • find /path/to/check -iname "*log4j*"
  • grep -rq log4j /path/to/check && echo log4j matches
  • find /path/to/check \( -iname "*.?ar" -o -iname "*.zip" \) | while read line; do echo $line; jar tvf $line | grep -i log4j; done
  • find /path/to/check \( -iname "*.tar.bz2" -o -iname "*.tar.bz2" \) | while read line; do echo $line; tar tvf $line | grep -i log4j; done

Yara rules

Running the rules:

  • yara -r yara/log4j.yara /path/to/check

Example here:

Personal

  • log4jball.yara - Hunts for references to Log4J balls
  • log4jjavaclass.yara - Hunts for references to Log4J java in class form
  • log4jjavasrc.yara - Hunts for references to Log4J java in source form
  • log4jimport.yara - Hunts for references to Log4J imports
  • log4jJndiLookup.yara - Hunts for references to Log4J JndiLookup

Source code to check

About

Detection rules to look for Log4J usage and exploitation

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • YARA 100.0%