<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>CVE-2021-44228 - Log4j - MINECRAFT VULNERABLE! (and SO MUCH MORE)</title>
        <link>https://stream.echo6.co/videos/watch/04aa0a5b-efc2-4a88-8ce6-276088779b85</link>
        <description>Timestamps (HUGE thanks to deetee in the comments for putting these together!!!): 0:00 - Introduction 0:49 - Tweet on gaining RCE via Minecraft 1:16 - Overview of topics covered in video 1:57 - Context surrounding Log4j exploit 3:08 - Blog posts &amp; Github repositories on CVE-2021-44228 3:58 - [Demo] Exploiting Log4j to get a callback to attacker-controlled server 6:58 - [Demo] Exploiting Log4j via unpatched Minecraft server (Spawning calc.exe) 21:00 - [Demo] Exploiting Log4j via unpatched Minecraft server (Spawning a reverse shell) 24:30 - How the industry is responding from a defense perspective 27:37 - Industry chatter surrounding CVE-2021-44228 28:52 - Blog post discussion 29:28 - Open Source Log4Shell Vulnerability Tester 32:28 - Conclusion Detection: https://twitter.com/thinkstcanary/status/1469439743905697797?s=21 https://twitter.com/an0maious/status/1469350532548632581 https://twitter.com/an0n_r0/status/1469643986403008515 Threats: https://twitter.com/zom3y3/status/1469508032887414784 Bypasses: https://twitter.com/Rezn0k/status/1469523006015750146 For more content, subscribe on Twitch! https://twitch.tv/johnhammond010 If you would like to support me, please like, comment &amp; subscribe, and check me out on Patreon: https://patreon.com/johnhammond010 PayPal: https://paypal.me/johnhammond010 E-mail: johnhammond010@gmail.com Discord: https://johnhammond.org/discord Twitter: https://twitter.com/_johnhammond GitHub: https://github.com/JohnHammond If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. https://www.kite.com/get-kite/?utm_medium=referral&amp;utm_source=youtube&amp;utm_campaign=johnhammond&amp;utm_content=description-only (disclaimer, affiliate link)</description>
        <lastBuildDate>Wed, 15 Apr 2026 09:23:53 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>CVE-2021-44228 - Log4j - MINECRAFT VULNERABLE! (and SO MUCH MORE)</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/04aa0a5b-efc2-4a88-8ce6-276088779b85</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=04aa0a5b-efc2-4a88-8ce6-276088779b85" rel="self" type="application/rss+xml"/>
    </channel>
</rss>