Главная
Study mode:
on
1
Intro
2
A Story of Pwn
3
A Brief Introduction to RMI
4
The RMI Registry Service
5
Implementing RMI
6
RMI Security
7
Insecure Use of RMI
8
RMI Enumeration
9
Knocking on Java's Back Door
10
Apache JMeter
11
Temis Remote Admin Server
12
RMI: What's the Problem?
13
Deserialization
14
Adobe ColdFusion
15
Demo Time!
16
Full RMI Proxy
17
Proxying RMI
18
Poking Java's Back Door
19
Conclusion
20
Questions?
Description:
Explore Java's Remote Method Invocation (RMI) security vulnerabilities in this 42-minute conference talk from 44CON 2017. Delve into the prevalence of RMI, common security mistakes, potential exploits, and methods for securing RMI services. Learn about BaRMIe, a tool developed for RMI service enumeration and exploitation, and discover vulnerabilities within Java itself. Gain insights into RMI registry services, implementation, security concerns, and insecure usage. Witness demonstrations of RMI enumeration, exploitation techniques, and full RMI proxying. Understand the implications of deserialization attacks and their impact on popular software like Apache JMeter and Adobe ColdFusion.

BaRMIe - Poking Java’s Back Door

44CON Information Security Conference
Add to list
0:00 / 0:00