Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Java Agent - Modifying Bytecode at Runtime to Protect Against Log4J

GOTO Conferences via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the power of Java Agents in modifying bytecode at runtime to enhance application security. Learn how Java Agents work, both when configured at startup and when attached to a running process. Discover the underlying Java Agent API and its applications in analyzing and modifying applications. Follow along with a practical example of bytecode modification to protect against Log4J and other vulnerabilities. Gain insights into dynamic and static agent attachment, Runtime Application Self-Protection (RASP), Log4J interpolation, JNDI, and the potential threats posed by malicious JNDI servers. Watch a live demonstration of patching Log4J at runtime and see a vulnerability demo in action. This conference talk provides valuable resources, code examples, and recommended books for Java developers interested in enhancing their understanding of application security and bytecode manipulation.

Syllabus

Intro
java.langinstrumentation
Dynamically attaching
JBOM Demo
Static attaching
RASPs
Log4J interpolation
What is JNDI
What a malicious JNDI server can do
Patching Log4J at runtime
Vulnerability Demo
Links
Outro

Taught by

GOTO Conferences

Reviews

Start your review of The Java Agent - Modifying Bytecode at Runtime to Protect Against Log4J

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.