Skip to content

Uses a public CSV file of known bad actors that are using the Log4j vulnerability and checks for connection attempts using vRealize Network Insight

Notifications You must be signed in to change notification settings

vrealize-network-insight/vrni-log4j-flow-check

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Python script to check for Log4j bad actors using vRealize Network Insight

This python script downloads a public CSV file filled with IPs of bad actors that are trying to abuse the Log4j vulnerability. Then it uses the vRealize Network Insight APIs to check whether any connection attempts have been made in the network that vRNI monitors.

CSV file with IPs: https://gist.github.com/blotus/f87ed46718bfdc634c9081110d243166

Prerequisites

Usage

This is how to run the script:

# export PYTHONPATH=/your/path/tp/network-insight-sdk-python/swagger_client-py2.7.egg
# python3 vrni-log4j-flow-check.py --platform_ip pre-ga.vrni.cmbu.local --username toolkit@local.com --password $VRNI_PW

If you are running this on the vRealize Network Insight Toolkit, the Python SDK and PYTHONPATH will already be set: all you have to do is download the script onto the Toolkit and run it using above command.

Example

example output

About

Uses a public CSV file of known bad actors that are using the Log4j vulnerability and checks for connection attempts using vRealize Network Insight

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages