Get Started
Intro
1. Learn basics
2. Experience impact
3. Build knowledge
4. Practice skills

Level up

your skills

Uplift your secure code skills systematically with 100% hands-on training in how to spot and fix vulnerabilities, in your choice of programming language and frameworks.

In this showcase, we will take you from learning the basic idea of Log4j Log4Shell security vulnerability to experiencing its impact in a real-world scenario. Secure Code Warrior skills platform’s unique preventative approach will help make security an intrinsic part of your thought process and workflow to produce quality software - fast!

Next   >

Sorry to hear that. We are expanding our language coverage for walkthrough mission content as we speak. Meanwhile, why not try Pseudocode to get a taste of what we offer?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
C# .NET Core
C# MVC
C# Web Forms
Go
Java EE (JSF)
Java EE (JSP)
Java Spring
Node.js Express
Python
Python Django
Python Flask
Pseudocode

How well do you know Log4j Log4Shell security vulnerability?

Try it for yourself  

Invite your teammates to try out the challenges as well

Contact us to request a free secure coding course for your team today.

Book a demo
© 2015-2021 Secure Code Warrior Limited. All Rights Reserved. Terms of Use | Privacy Policy | Cookie Policy

Learn the basics

understand fundamentals

Kick start your mastery of Log4Shell with free learning resources

Log4j Log4Shell security vulnerability

What is this vulnerability?

Log4Shell is a high severity vulnerability (CVE-2021-44228, CVSSv3 10.0) impacting multiple versions of the Apache Log4j 2 utility. The vulnerability allows for unauthenticated remote code execution. Log4j-core is one of the most common Java logging libraries being used, and therefore it puts millions of applications at risk.

‍Where does this vulnerability usually arise?

Logged user input is being evaluated at runtime. If the log entry contains the prefix JNDI (Java Naming and Directory Interface), then this service will perform a lookup via a protocol (LDAP, RMI, DNS, etc.), and make a request to the specified server, controlled by the attacker. The response contains a classpath referring to a malicious payload, which is then executed on the vulnerable service.

Experience the impact  
} } } } } Sorry, your browser does not seem to support embedded videos

Invite your teammates to try out the challenges as well

Contact us to request a free secure coding course for your team today.

Book a demo
© 2015-2021 Secure Code Warrior Limited. All Rights Reserved. Terms of Use | Privacy Policy | Cookie Policy

Instructional walkthroughs

Experience the impact of poor coding practices

Forget boring training - systematically build your secure coding skills by trying out this real-world Log4Shell scenario!

Close

Some Header

We are expanding our language coverage for walkthrough content as we speak. Meanwhile, why not try the walkthrough in Pseudocode to get a taste of what we offer?

OK
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Next   >
© 2015-2021 Secure Code Warrior Limited. All Rights Reserved. Terms of Use | Privacy Policy | Cookie Policy

Build your knowledge

with cognitive learning

Level-up your secure coding knowledge with 100% hands-on coding framework specific challenges covering web, mobile, front-end, APIs, IaC, and more.

Learn fast with guided skill-based pathways

Guided learning pathways help you reach your learning goals faster by focusing on OWASP Top 10, Injection Flaws or specific vulnerabilities in your companies code base.

Build your secure coding knowledge with interactive framework-specific coding exercises that challenge you to:

  • Identify vulnerabilities - Build awareness in recognizing different types of vulnerabilities and how they work
  • Locate vulnerabilities - Level up skills in finding vulnerabilities during code-review
  • Fix vulnerabilities - Understand how to mitigate and resolve the vulnerability
Practice your skills  
} } } } } Sorry, your browser does not seem to support embedded videos
Ansible
Bash
C# (.NET): Basic
C# (.NET): Core
C# (.NET): MVC
C# (.NET): Web API
C# (.NET): Web Forms
C++:Basic
C++:Embed
C:Basic
C:Embed
COBOL
COBOL:Mainframe
Cloudformation
Docker
GO
GO: Web API
Java
Java Servlets
Java Spring
Java Struts
Java: Android SDK
Java: Enterprise Edition (API)
Java: Enterprise Edition (JSF)
Java: Enterprise Edition (JSP)
Java: Spring API
JavaScript: Angular.io (2+)
JavaScript: React
Javascript
Kotlin Spring API
Kotlin: Android SDK
Kubernetes
Node.js (Express)
Node.js API
Objective-C: iOS SDK
Oracle PL/SQL
PHP Basic
PHP Laravel
PHP Symfony
Perl: Dancer2
Powershell
Pseudocode
Pseudocode: Mobile
Python
Python Web API
Python: Django
Python: Flask
RPG:Basic
React Native
Ruby: Rails
Rust
SAP:ABAP
Salesforce Apex
Scala: Play
Swift
Terraform
Typescript
Vue.js

Unmatched content library

Secure Code Warrior training provides hyper-relevant content across over 155+ different vulnerability types, including the all important OWASP Top 10 and CWE/SANS Top 25.

Framework-specific training ensures you learn about the exact APIs and code structure that you use daily. Secure Code Warrior content is available in more than 55 languages and frameworks. From COBOL to Rust and everything in between - we've got you covered!

Request a free secure coding course 

Invite your teammates to try out the challenges as well

Contact us to request a free secure coding course for your team today.

Request a team trial
© 2015-2021 Secure Code Warrior Limited. All Rights Reserved. Terms of Use | Privacy Policy | Cookie Policy

Practice your skills

apply your skills in friendly competition

Test your secure coding skills in tournaments and challenge your peers to win the ultimate bragging rights.

Compete in a hands-on coding tournament

In a Secure Code Warrior tournament, players are presented with a series of coding challenges and missions, ranked from easy through to fiendishly hard!

Get fired up for a friendly competition that is not only fun but also educational! Whether you are just beginning your security journey or are a grizzled veteran, there is something for everyone in a secure coding tournament.

‍

Request a tournament for your team

Compete in a hands-on coding tournament

In a Secure Code Warrior tournament, players are presented with a series of coding challenges and missions, ranked from easy through to fiendishly hard!

Get fired up for a friendly competition that is not only fun but also educational! Whether you are just beginning your security journey or are a grizzled veteran, there is something for everyone in a secure coding tournament.

‍

Request a tournament for your team
} } } } } Sorry, your browser does not seem to support embedded videos

Helpful resources to level-up your skills

Blog Post

Coders Conquer Security: Insecure Direct Object Reference

A direct object reference is when a specific record (the 'object'), is referenced within an application. It usually takes the form of a unique identifier and may appear in a URL.

View Resource   >
Tool

Sensei

Sensei empowers you with a secure coding solution directly in your IDE, so that you can share your software knowledge, increase your team’s efficiency and improve secure coding practices by suggesting guidance that breaks the cycle of recurring poor coding practices.

View Resource   >
Integration

Secure Code Warrior for GitHub

Secure Code Warrior for GitHub adds contextual application security training material to the pull requests and issues you are working on, giving you access to knowledge when you need it most in order to help you and your team ship quality code faster.

View Resource   >
Integration

Secure Code Warrior for Jira

Secure Code Warrior for Jira adds contextual application security training material to the issues you are working on, giving you access to knowledge when you need it most in order to help you and your team ship quality code faster.

View Resource   >

Invite your teammates to try out the challenges as well

Contact us to request a free secure coding course for your team today.

Book a demo
© 2015-2021 Secure Code Warrior Limited. All Rights Reserved. Terms of Use | Privacy Policy | Cookie Policy
Contact us