Let op: Deze pagina komt uit ons archief. Ga voor actuele informatie en nieuws naar onze vernieuwde website. |
|||||||||
LOG4SHELL: Getting to know your adversarySpeaker: Sake Blok Abstract
What does a LOG4SHELL attack look like on the network and how to analyze the LOG4SHELL attack (including some of its deployed exploits) with Wireshark.
BiographySake Blok calls himself "Relational Therapist for Computer Systems", as he solves problems by looking closely at the communication between computer systems. He has been using Wireshark/Ethereal for almost 20 years. In 2009, Sake started the company SYN-bit to provide network analysis and training services to enterprises across Europe. During his work, Sake started developing functionality for Wireshark that he missed while working with the analyser in his day-to-day job. He also enhanced multiple protocol dissectors to suit his analysis needs. In 2007, Sake joined the Wireshark Core Development team. Twitter: @SYNbit |
najaar 2022 | ||||||||
2023-05-27 | |||||||||
|