{"title":"Log4shell Investigate Based On Generic Computer Forensic Investigation Model","authors":"Ukid Changsan, Pongsarun Boonyopakorn","doi":"10.1109/ECTI-CON58255.2023.10153283","DOIUrl":null,"url":null,"abstract":"Log 4Shel1 (CVE-2021-44228) Vulnerability was disclosed on November 24, 2021. It is loophole from JAVA application which is a ubiquitous library of Log4j for logging framework. The hacker invokes JNDI lookup component for call Lightweight Directory Access Protocol (LDAP) which attacked by several ways such as Remote Code Execute (RCE) which is a critical effect on the vulnerable server. Therefore, this research paper proposes a study to investigate Log 4Shell under the control of the Generic Computer Forensic Investigation Model (GCFIM). The purpose of this investigation is to determine the management of the analysis process for accessing guideline information, gathering data, and analyzing digital evidence related to the Log4Shell attack. Furthermore, the paper provides a report documenting the source of the attacker that attacked the servers, which can be used as evidence in legal documents in court.","PeriodicalId":340768,"journal":{"name":"2023 20th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","volume":"1241 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 20th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECTI-CON58255.2023.10153283","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Log 4Shel1 (CVE-2021-44228) Vulnerability was disclosed on November 24, 2021. It is loophole from JAVA application which is a ubiquitous library of Log4j for logging framework. The hacker invokes JNDI lookup component for call Lightweight Directory Access Protocol (LDAP) which attacked by several ways such as Remote Code Execute (RCE) which is a critical effect on the vulnerable server. Therefore, this research paper proposes a study to investigate Log 4Shell under the control of the Generic Computer Forensic Investigation Model (GCFIM). The purpose of this investigation is to determine the management of the analysis process for accessing guideline information, gathering data, and analyzing digital evidence related to the Log4Shell attack. Furthermore, the paper provides a report documenting the source of the attacker that attacked the servers, which can be used as evidence in legal documents in court.