Playbook: Internal Host WinRM Log4j Investigate

Description

Published in response to CVE-2021-44228, this playbook uses WinRM to scan Windows endpoints for the presence of "jndilookup.class" in all .jar files. The presence of that string could indicate a log4j vulnerability.

Apps:

Associated Detections

How To Implement

The winrm asset requires Administrator access to scan the whole file system.

Explore Playbook

explore

Required fields

Reference

source | version: 1