{"id":11451,"date":"2021-12-12T12:15:03","date_gmt":"2021-12-12T11:15:03","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=11451"},"modified":"2022-03-25T14:15:38","modified_gmt":"2022-03-25T13:15:38","slug":"log4shell-detection-with-thor","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/","title":{"rendered":"Log4Shell Detection with Nextron Rules"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The Log4Shell vulnerability (CVE-2021-44228) in log4j is actively exploited in-the-wild and highly critical. This blog posts lists some important web resources and the signatures that detect exploitation attempts.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Explanation of the Vulnerability&#8221; url=&#8221;https:\/\/www.lunasec.io\/docs\/blog\/log4j-zero-day\/&#8221; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-12.12.53.png&#8221; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>LunaSec reported first on the vulnerability.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Canary-based Vulnerability Detection&#8221; url=&#8221;https:\/\/twitter.com\/cyb3rops\/status\/1469405846010572816&#8243; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-11.45.25.png&#8221; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Use this method to detect vulnerable applications and services in your organisation.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Grep \/ ZGrep Detection Ideas&#8221; url=&#8221;https:\/\/gist.github.com\/Neo23x0\/e4c8b03ff8cdf1fa63b7d15db6e3860b&#8221; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-11.53.40.png&#8221; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Different detection patterns and idea to detect exploitation attempts in log files using grep and zgrep.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Log4Shell Detector Python Script&#8221; url=&#8221;https:\/\/github.com\/Neo23x0\/log4shell-detector&#8221; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/screen1.png&#8221; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>A python script that can be used to detect even the most obfuscated versions of the malicious payload.\u00a0<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;List of Advisories by Vendors&#8221; url=&#8221;https:\/\/gist.github.com\/SwitHak\/b66db3a06c2955a9cb71a8718970c592&#8243; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-11.50.10.png&#8221; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Big collection of advisories and statements by different vendors that use JAVA and log4j.\u00a0<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;List of Vulnerable Software with PoCs&#8221; url=&#8221;https:\/\/github.com\/YfryTchsGD\/Log4jAttackSurface&#8221; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-13-at-11.38.45.png&#8221; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Incomplete list of software products that have proven to be vulnerable.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Log4Shell Vulnerability Scanner (Local Files)&#8221; url=&#8221;https:\/\/github.com\/hillu\/local-log4j-vuln-scanner&#8221; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-17.16.33.png&#8221; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Scans the file system of application servers for vulnerable versions of the log4j module.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Fenrir Log4Shell Release&#8221; url=&#8221;https:\/\/github.com\/Neo23x0\/Fenrir\/releases&#8221; url_new_window=&#8221;on&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-13-at-13.29.51.png&#8221; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>A bash based IOC scanner that can be used on any Linux\/Unix system to detect traces of the attack and vulnerable log4j versions.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h1>Signatures Detecting Log4Shell Attacks<\/h1>\n<p>Check for matches with the following rules:<\/p>\n<h3>Exploitation<\/h3>\n<p>YARA<\/p>\n<ul>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CVE_2021_44228_Dec21_Soft\">EXPL_Log4j_CVE_2021_44228_Dec21_Soft<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CVE_2021_44228_Dec21_Hard\">EXPL_Log4j_CVE_2021_44228_Dec21_Hard<\/a><\/li>\n<li>\n<div>\n<div><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CVE_2021_44228_Dec21_OBFUSC\"><span>EXPL_Log4j_CVE_2021_44228_Dec21_OBFUSC<\/span><\/a><\/div>\n<\/div>\n<\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CVE_2021_44228_JAVA_Exception_Dec21_1\">EXPL_Log4j_CVE_2021_44228_JAVA_Exception_Dec21_1<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_Base64_Encoded_Exploit_Indicators_Dec21\">SUSP_Base64_Encoded_Exploit_Indicators_Dec21<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_JDNIExploit_Indicators_Dec21\">SUSP_JDNIExploit_Indicators_Dec21<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_EXPL_OBFUSC_Dec21_1\">SUSP_EXPL_OBFUSC_Dec21_1<\/a><\/li>\n<li>\n<div>\n<div><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_JNDI_Exploit_Patterns_Dec21_1\"><span>EXPL_JNDI_Exploit_Patterns_Dec21_1<\/span><\/a><\/div>\n<\/div>\n<\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/EXPL_Log4j_CallBackDomain_IOCs_Dec21_1\">EXPL_Log4j_CallBackDomain_IOCs_Dec21_1<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_EXPL_JAVA_Class_Dec21_1\"> SUSP_EXPL_JAVA_Class_Dec21_1 <\/a><\/li>\n<\/ul>\n<p>Sigma<\/p>\n<ul>\n<li><a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/web\/web_cve_2021_44228_log4j_fields.yml\">Log4j RCE CVE-2021-44228 in Fields<\/a><br \/>\nUUID: 9be472ed-893c-4ec0-94da-312d2765f654)<\/li>\n<li><a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/web\/web_cve_2021_44228_log4j.yml\">Log4j RCE CVE-2021-44228 Generic<\/a><br \/>\n(UUID: 5ea8faa8-db8b-45be-89b0-151b84c82702)<\/li>\n<li><span><a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/web\/web_jndi_exploit.yml\">JNDIExploit Kit Pattern<\/a><br \/>\n<\/span>(UUID: 412d55bc-7737-4d25-9542-5b396867ce55)<\/li>\n<\/ul>\n<h3>Post-Exploitation<\/h3>\n<p>Look for matches with the following rules that trigger on activity observer in-the-wild.<\/p>\n<p>YARA<\/p>\n<ul>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_LNX_SH_Cron_Wget_Apr21_1\">SUSP_LNX_SH_Cron_Wget_Apr21_1<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_LNX_Crontab_Wget_Oct21_1\">SUSP_LNX_Crontab_Wget_Oct21_1<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/SUSP_ShellCommands_Oct19\">SUSP_ShellCommands_Oct19<\/a><\/li>\n<li><a href=\"https:\/\/valhalla.nextron-systems.com\/info\/rule\/Pentest_FullShell_Commands\">Pentest_FullShell_Commands<\/a><\/li>\n<\/ul>\n<p>Sigma<\/p>\n<ul>\n<li><a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/linux\/builtin\/lnx_shell_susp_commands.yml\">Suspicious Activity in Shell Commands<\/a><br \/>\n(UUID: 2aa1440c-9ae9-4d92-84a7-a9e5f5e31695)<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>ASGARD Users<\/h1>\n<p>It takes us few days to release new rules. The rules that we wrote over the weekend may not be available on Monday 13th of December. ASGARD users that want to use the signatures that are still in our QS, can activate the option for these signatures in &#8220;Settings &gt; Advanced &gt; Show Signature SigDev Option&#8221;.\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-17.08.08.png&#8221; title_text=&#8221;Screenshot 2021-12-12 at 17.08.08&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>After changing the setting, new scans show an additional option in the dropdown menu.\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2021\/12\/Screenshot-2021-12-12-at-17.08.53.png&#8221; title_text=&#8221;Screenshot 2021-12-12 at 17.08.53&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Please contact our support in case of any questions.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>THOR Users<\/h1>\n<p>Users of our scanner THOR also need to use the signature version that&#8217;s in development to get the newest signatures that detect log4j exploitation.\u00a0<\/p>\n<p>Retrieve that signature pack with:<\/p>\n<p><strong>thor-util.exe update &#8211;sigdev<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Log4Shell vulnerability (CVE-2021-44228) in log4j is actively exploited in-the-wild and highly critical. This blog posts lists some important web resources and the signatures that detect exploitation attempts.LunaSec reported first on the vulnerability.Use this method to detect vulnerable applications and services in your organisation.Different detection patterns and idea to detect exploitation attempts in log files using grep and zgrep.A python script that can be used to detect even the most obfuscated versions of the malicious payload.\u00a0Big collection of advisories and statements by different vendors that use JAVA and log4j.\u00a0Incomplete list of software products that have proven to be vulnerable.Scans the file system of application servers for vulnerable versions of the log4j module.A bash based IOC scanner that can be used on any Linux\/Unix system to detect traces of the attack and vulnerable log4j versions.Signatures Detecting Log4Shell Attacks Check for matches with the following rules: Exploitation YARA EXPL_Log4j_CVE_2021_44228_Dec21_Soft EXPL_Log4j_CVE_2021_44228_Dec21_Hard EXPL_Log4j_CVE_2021_44228_Dec21_OBFUSC EXPL_Log4j_CVE_2021_44228_JAVA_Exception_Dec21_1 SUSP_Base64_Encoded_Exploit_Indicators_Dec21 SUSP_JDNIExploit_Indicators_Dec21 SUSP_EXPL_OBFUSC_Dec21_1 EXPL_JNDI_Exploit_Patterns_Dec21_1 EXPL_Log4j_CallBackDomain_IOCs_Dec21_1 SUSP_EXPL_JAVA_Class_Dec21_1 Sigma Log4j RCE CVE-2021-44228 in Fields UUID: 9be472ed-893c-4ec0-94da-312d2765f654) Log4j RCE CVE-2021-44228 Generic (UUID: 5ea8faa8-db8b-45be-89b0-151b84c82702) JNDIExploit Kit Pattern (UUID: 412d55bc-7737-4d25-9542-5b396867ce55) Post-Exploitation Look for matches with the following rules that trigger on activity observer in-the-wild. YARA SUSP_LNX_SH_Cron_Wget_Apr21_1 SUSP_LNX_Crontab_Wget_Oct21_1 SUSP_ShellCommands_Oct19 Pentest_FullShell_Commands Sigma Suspicious Activity in Shell Commands [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[46,32],"tags":[656,655,654,5],"class_list":["post-11451","post","type-post","status-publish","format-standard","hentry","category-newsletter","category-thor","tag-cve-2021-44228","tag-log4j","tag-log4shell","tag-thor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Log4Shell Detection with Nextron Rules - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Log4Shell Detection with Nextron Rules\",\"datePublished\":\"2021-12-12T11:15:03+00:00\",\"dateModified\":\"2022-03-25T13:15:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/\"},\"wordCount\":1264,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"CVE-2021-44228\",\"Log4j\",\"Log4Shell\",\"thor\"],\"articleSection\":[\"Newsletter\",\"THOR\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/\",\"name\":\"Log4Shell Detection with Nextron Rules - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2021-12-12T11:15:03+00:00\",\"dateModified\":\"2022-03-25T13:15:38+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log4Shell Detection with Nextron Rules - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Log4Shell Detection with Nextron Rules","datePublished":"2021-12-12T11:15:03+00:00","dateModified":"2022-03-25T13:15:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/"},"wordCount":1264,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["CVE-2021-44228","Log4j","Log4Shell","thor"],"articleSection":["Newsletter","THOR"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/","url":"https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/","name":"Log4Shell Detection with Nextron Rules - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2021-12-12T11:15:03+00:00","dateModified":"2022-03-25T13:15:38+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2021\/12\/12\/log4shell-detection-with-thor\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/11451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=11451"}],"version-history":[{"count":21,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/11451\/revisions"}],"predecessor-version":[{"id":11535,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/11451\/revisions\/11535"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=11451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=11451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=11451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}