Apache HertzBeat (incubating) is an easy-to-use, open source, real-time monitoring system with agentless, high performance cluster, prometheus-compatible, offers powerful custom monitoring and status page building capabilities.
CVE-2024-42323 is a SnakeYaml deserialization vulnerability in Apache HertzBeat (incubating) that can lead to remote code execution (RCE). This vulnerability can only be exploited by an authorized user.
Objectives:
- Verify and deploy a vulnerable application as a Docker Contianer
- Exploit using custom payloads
- Detect threats using runtime security tools like Falco
- Enforce best practices and secure container environments against breaches
Ideal for Security Professionals, Devops Teams, and Penetration Testers

Here is the course outline:
In-House Labs |
Completion
The following certificates are awarded when the course is completed:
![]() |
CPE Credit Certificate |