log4shell detection #6639
-
Hey Yall, |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
There are a few different ways to do this, which we don't necessarily go into too much detail around, but here are a few examples:
Keep in mind, you'll want to focus on particular behaviors and activity as opposed to static indicators when dealing with exploitation attempts. For example, performing groupbys and stacking within Hunt (ex. user agent, suspicious outbound frequency/protocols, etc) |
Beta Was this translation helpful? Give feedback.
There are a few different ways to do this, which we don't necessarily go into too much detail around, but here are a few examples:
Ex. https://github.com/SigmaHQ/sigma/blob/master/rules/web/web_cve_2021_44228_log4j_fields.yml