Skip to content

Commit

Permalink
small updates
Browse files Browse the repository at this point in the history
  • Loading branch information
mfosterrox committed Aug 6, 2024
1 parent 8cb8683 commit b3ca8b1
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 12 deletions.
6 changes: 3 additions & 3 deletions content/modules/ROOT/nav.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -11,9 +11,9 @@
* xref:10-installation.adoc[10. Installation]
* xref:misc-log-4-shell-lab.adoc[Black Hat - log4shell Example]
* xref:misc-reverse-shell.adoc[Black Hat - reverse shell runtime Example]
* xref:misc-hacking-linux.adoc[Bonus - CTF - hack a web application]
* xref:misc-paladin.adoc[Bonus - Paladin Cloud & RHACS Integration]
// * xref:misc-reverse-shell.adoc[Black Hat - reverse shell runtime Example]
* xref:misc-hacking-linux.adoc[Black Hat - CTF - hack a web application]
// * xref:misc-paladin.adoc[Bonus - Paladin Cloud & RHACS Integration]
Expand Down
19 changes: 10 additions & 9 deletions content/modules/ROOT/pages/misc-log-4-shell-lab.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,8 @@ IMPORTANT: If you do not see the '{}' response, please flag a booth attendant.

The next step is to deploy the log4shell laden container image to the OpenShift cluster.

. Procedure
*Procedure*

. Start by creating a new project and deploying a vulnerable Log4Shell application.

[source,sh,subs="attributes",role=execute]
Expand Down Expand Up @@ -206,7 +207,7 @@ NOTE: *CVE-2021-44228* & *CVE-2021-45046* can both be used to find the log4shell

image:misc-log-1.gif[]

.Procedure
*Procedure*

. Click the *Vulnerability Management Tab*, then click the *Workload CVE* tab
. Use the filter dropdown options to ensure that *CVE* and *Name* are selected.
Expand All @@ -222,24 +223,22 @@ Many default policies ship with RHACS. These policies notify you of violations b

First, copy the default policy. You can do this by copying the video actions or following the Procedure listed below.

video::l4s-policy1.mp4[width=640,start=60,opts=autoplay]

.Procedure
*Procedure*

. Click on *Platform Configuration* -> *Policy Management*
. Click the search dropdown and select *Policy*
. Type in *Log4Shell* and hit *ENTER*
. Clone the *Log4Shell: log4j Remote Code Execution vulnerability* policy by clicking the three dots to the right of the policy and selecting *Clone policy* OR by clicking the policy, selecting actions and clicking *Clone policy*

video::l4s-policy1.mp4[width=640,start=60,opts=autoplay, class="center" ]

---

Great job!

Now, let's give the policy a new name and enforce it during the build and deploy phases.

video::l4s-policy2.mp4[width=640,start=60,opts=autoplay]

.Procedure
*Procedure*

. Give the policy an additional identifier for easier searchability. You can also leave the *(COPY)* label at the end.
. Click Next
Expand All @@ -255,6 +254,8 @@ NOTE: This will break container builds AND not allow the deployment of the log4s
. Click next on the *Policy scope* page. This page allows you to exclude specific clusters, namespaces and deployments. However, we do not want to do this for the log4shell vulnerability.
. Review the policy and *click Save*

video::l4s-policy2.mp4[width=640,start=60,opts=autoplay]

image::https://media.giphy.com/media/v1.Y2lkPTc5MGI3NjExMGh0OWkxemNoNmF4dG9lNHE4bncwOWpkdzR6NHJ6dDNuOW0xYnMwaSZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/7auaKlfmip8gE/giphy.gif[link=self, window=blank, width=100%, class="center"]

What he said ^!
Expand Down Expand Up @@ -307,7 +308,7 @@ A complete record of the event can be found on the *Violations* page. Click on i

image::l4s-violations.png[]

.Procedure
*Procedure*
. Navigate to the *Violation* page from the left navigation bar.
. Use the Filter Bar to find the `Policy: Log4Shell: log4j Remote Code Execution vulnerability` and select the policy name.
. Explore the list of the violation events.
Expand Down

0 comments on commit b3ca8b1

Please sign in to comment.