Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Share your story #96

Open
xeraph opened this issue Dec 16, 2021 · 6 comments
Open

Share your story #96

xeraph opened this issue Dec 16, 2021 · 6 comments
Labels
discussion question or suggestion

Comments

@xeraph
Copy link
Contributor

xeraph commented Dec 16, 2021

  • Would you introduce yourself?
  • How many server did you scanned or fixed?
  • Did you completed your mission? How long does it take?
  • Have you tried other tools? What was the difference?
  • Do you have any useful tips?
@xeraph xeraph pinned this issue Dec 16, 2021
@xeraph xeraph added the discussion question or suggestion label Dec 16, 2021
@romestylez
Copy link

We are still investigating. In the first try we scanned our DMZ systems now we are going to scan the rest. At the end its around 2900 Servers (Win/Unix).

We searched with own powershell scripts etc. what our automation team is missing the most are error codes for the scanner but we are happy to have this tool :)

@jlellis
Copy link

jlellis commented Dec 16, 2021

Would you introduce yourself? Sr Linux Sysadmin at Pavlov Media. Formally a Java developer.

How many server did you scanned or fixed? scanned several hundred, fixed about 20.

Did you completed your mission? How long does it take? Not completed. The darn issue keeps expanding with more CVEs.

Have you tried other tools? What was the difference? Looked at other tools, the best one requires python to be installed on hosts to run it; total non starter for Windows, our Senior Windows admin rejected that idea outright. He's willing to use the pre-compiled binary for windows, though. (I'm old school and don't download linux binaries from github, I build from source.)

Do you have any useful tips? Beware the spaces in filenames issues. Running the jar on Linux doesn't like being told to use a ./ prefix on a path. windows doesn't like putting quotes around parameters, and powershell can mangle your dashes and quotes. I'm used to bash so I escape such things without thinking much about it.

@jgstew
Copy link
Contributor

jgstew commented Dec 17, 2021

  • Would you introduce yourself?
    • I'm a software developer and automation engineer working for the endpoint management product HCL BigFix. I am trying to contribute back to this project as I can as we work on content to automate it.
  • How many server did you scanned or fixed?
    • Helping our customers scan thousands of systems at once by running this utility through BigFix.
  • Did you completed your mission? How long does it take?
  • Have you tried other tools? What was the difference?
    • We tried approaches that scanned looking for JAR files that contain log4j2-core-* but the Logpresso scan utility found tons more results within renamed JAR files, WAR files, EAR files, and JAR files that contain many things bundled together.
  • Do you have any useful tips?
    • Test test test. Do gradual rollouts across many devices to not overwhelm storage of VM hosts, networks, etc.
    • Take a long vacation when this settles down.

@strawgate
Copy link
Contributor

Would you introduce yourself?
I lead a security software company that helps organizations operating Critical Infrastructure to detect and mitigate threats

How many server did you scanned or fixed?
10,000+ Servers

Did you complete your mission? How long does it take?
We are using Logpresso with our other tools as an "enhanced" detection mechanism and are having great luck so far!

Have you tried other tools? What was the difference?
The developer of Logpresso is way more responsive :)

Do you have any useful tips?
Test!

@doctore74
Copy link

doctore74 commented Dec 19, 2021

Would you introduce yourself?
I'm an IT Engineer from Germany.

How many server did you scanned or fixed?
MANY. Number increasing.
Accidentally fixed a system automatically with the parameter force-fix :-D

Did you completed your mission? How long does it take?
I'm pretty sure this issue will be with us for a long time, like the coronavirus.
Everyone should scan their hosts on a regular basis. Use a monitoring tool. We build a check plugin for checkmk. Open-Source and free version available.
Blog arcticle
Latest version of the check plugin
Discussion to for the plugin developement - JOIN US!
With checkmk we were able to push the check on all monitored linux/windows hosts at once. The check will be executed every 4 hours.
For questions about checkmk ask Martin Hirschvogel Mh@tribe29.com (@martinhv)

Have you tried other tools? What was the difference?
Not yet. But I will do this for cross-checking.

Do you have any useful tips?

  • As @jlellis mentioned no one should use binaries downloaded from unknown sources. (use antivirus tools)
  • Provide checksums for the files to help finding possible code injections.
  • Provide howtos to build the binaries from source (@jlellis Can you assist here?)
  • Keep the scan binaries as small as possible so that the deployment doesn't use as much bandwidth.
  • I still have a stomachache when rolling out the scan tool to many systems. I don't want to kill many systems at once through my own fault. Find a solution to reduce CPU usage.

@xeraph AWSOME work! Keep going! Tell us if you need help. Contact the checkmk guys and bundle your competences.

@IanMajor12
Copy link

Great scanner, thank you. Very easy to use and very effective too.
Used on Windows with the following in a batch file

start "ServerName" /D .\Log4jScan /I log4j2-scan.exe --scan-log4j1 --scan-logback --scan-zip --report-path .\logs\ServerName.csv --report-csv \\ServerName\C$

We are able to scan our 89 servers from a single location this way.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
discussion question or suggestion
Projects
None yet
Development

No branches or pull requests

7 participants