Add some pressure to exercise 4.

This commit is contained in:
2024-10-23 11:22:12 +13:00
parent 94ba768ae1
commit 381ebf0da9

View File

@ -21,7 +21,7 @@ You're looking over the RHACS Dashboard together in the RHACS console.
You and Angie both spot it at the same time...
The core banking payments processor namespace `prd-acme-payments` is vulnerable to the critical log4j vulnerability 😱
The core banking payments processor namespace `prd-acme-payments` is vulnerable to the critical log4shell vulnerability 😱
![panic](/static/images/security/panik.png)
@ -47,6 +47,8 @@ If you've successfully secured the banks vulnerable payments processor please po
> Please review [team name] solution for exercise 4, our payments processor application is now unhackable.
WARNING: The hackathon team will perform a brief penetration test of the application. If your application is not actually secured and remains exploitable by the log4shell vulnerability one of your OpenShift cluster nodes will be deleted for the lulz. No pressure!
This exercise is worth `25` points. The event team will reply in slack to confirm your updated team total score 🎉
![safe](/static/images/security/hack-prevented.png)