<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://vicenteherrera.com/blog/</id><title>The Vlog</title><subtitle>Vicente Herrera personal blog.</subtitle> <updated>2023-11-06T18:36:04+01:00</updated> <author> <name>Vicente Herrera</name> <uri>https://vicenteherrera.com/blog/</uri> </author><link rel="self" type="application/atom+xml" href="https://vicenteherrera.com/blog/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://vicenteherrera.com/blog/"/> <generator uri="https://jekyllrb.com/" version="4.3.2">Jekyll</generator> <rights> © 2023 Vicente Herrera </rights> <icon>/blog/assets/img/favicons/favicon.ico</icon> <logo>/blog/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Log4j 2 vulnerabilities, part III: Prevention, mitigation and fixing</title><link href="https://vicenteherrera.com/blog/log4j-part-iii/" rel="alternate" type="text/html" title="Log4j 2 vulnerabilities, part III: Prevention, mitigation and fixing" /><published>2023-06-27T23:45:00+02:00</published> <updated>2023-07-14T09:32:59+02:00</updated> <id>https://vicenteherrera.com/blog/log4j-part-iii/</id> <content src="https://vicenteherrera.com/blog/log4j-part-iii/" /> <author> <name>Vicente Herrera</name> </author> <category term="Security" /> <summary> Wow, more than a year without writing anything more, and even leaving a three-part blog post unfinished… So what happened? Well, I started a new job, which requires a lot of focus as the beginning is crucial. All the time I had for starting the blog and writing the first articles was indeed because I already had left the old one and was waiting for the new job. A year of many interesting thin... </summary> </entry> <entry><title>Log4j 2 vulnerabilities, part II: Kubernetes POC</title><link href="https://vicenteherrera.com/blog/log4j-part-ii/" rel="alternate" type="text/html" title="Log4j 2 vulnerabilities, part II: Kubernetes POC" /><published>2022-02-01T22:25:00+01:00</published> <updated>2023-07-01T13:16:51+02:00</updated> <id>https://vicenteherrera.com/blog/log4j-part-ii/</id> <content src="https://vicenteherrera.com/blog/log4j-part-ii/" /> <author> <name>Vicente Herrera</name> </author> <category term="Security" /> <summary> Sorry, I couldn’t resist using a photo of a masked man operating in the dark several computers while standing up. It won’t happen again. In this second post about the Log4j 2 vulnerabilities, I will describe technical details of the remote code execution, as well as present a proof of concept using Kubernetes that is very easy to deploy, safe to run in a test environment, and very useful to te... </summary> </entry> <entry><title>Log4j 2 vulnerabilities, part I: History</title><link href="https://vicenteherrera.com/blog/log4j-part-i/" rel="alternate" type="text/html" title="Log4j 2 vulnerabilities, part I: History" /><published>2021-12-17T17:30:00+01:00</published> <updated>2023-07-01T13:16:51+02:00</updated> <id>https://vicenteherrera.com/blog/log4j-part-i/</id> <content src="https://vicenteherrera.com/blog/log4j-part-i/" /> <author> <name>Vicente Herrera</name> </author> <category term="Security" /> <summary> On the 9th of December 2021, a critical update because a vulnerability was published for the popular open source Log4j 2 library. The next day it was classified as CVE‑2021‑44228. Some people started calling it “log4shell”, as it allowed very easily to do a remote code execution attack. Days later several new vulnerability reports and patches would be published for this and related projects. T... </summary> </entry> <entry><title>What is a CVE?</title><link href="https://vicenteherrera.com/blog/what-is-a-cve/" rel="alternate" type="text/html" title="What is a CVE?" /><published>2021-12-06T05:20:00+01:00</published> <updated>2023-06-28T08:15:03+02:00</updated> <id>https://vicenteherrera.com/blog/what-is-a-cve/</id> <content src="https://vicenteherrera.com/blog/what-is-a-cve/" /> <author> <name>Vicente Herrera</name> </author> <category term="Security" /> <summary> You are playing Cyberpunk 2077, and on the introductory mission, you have to steal a car. After using an electronic tool first to open its door, you get inside, and while the hijack takes place, a message appears on the sophisticated onscreen display of the car: RUN:EXPLOIT.CVE-0322.B/055BCCAC9FEC/LOADING That sounds familiar, isn’t it? You are trying to figure out the numbers written the... </summary> </entry> <entry><title>Introduction to MITRE ATT&amp;CK</title><link href="https://vicenteherrera.com/blog/intro-mitre-attack/" rel="alternate" type="text/html" title="Introduction to MITRE ATT&amp;CK" /><published>2021-11-25T19:34:00+01:00</published> <updated>2022-02-02T18:31:38+01:00</updated> <id>https://vicenteherrera.com/blog/intro-mitre-attack/</id> <content src="https://vicenteherrera.com/blog/intro-mitre-attack/" /> <author> <name>Vicente Herrera</name> </author> <category term="Security" /> <summary> When you start working on cybersecurity, you for sure start seeing references to things like privilege escalation, lateral movement, or exfiltration continuously. As categories for security tools, rules, or types of attacks, with mentions to something called MITRE. Then you head to the MITRE ATT&amp;amp;CK website and discover a treasure of useful information. But it is a huge amount of it, and in... </summary> </entry> </feed>
