Главная
Study mode:
on
1
Intro
2
Java remote protocol
3
Simple architecture
4
Protocol analysis
5
Past exploits
6
JRE History
7
Attacking RMI - Registry whitelist bypass
8
Custom services
9
JMX flow
10
IBM Websphere Application Server
11
Vendors are not prepared for this
12
Attacking RMI 45 - (in)Security Manager
13
Attacking RMI 46 - RMI Registry
14
Exploit analysis
15
Vulnerability pattern
16
CORBA Naming Service
17
Mitigations
18
Exploit Development
Description:
Explore critical flaws in Java Remote Method Invocation (RMI) and Common Object Request Broker Architecture (CORBA) in this 45-minute Black Hat conference talk. Delve into the technical workflow of these widely deployed cross-process communication mechanisms, uncovering security vulnerabilities and vendor implementation failures. Learn about Java remote protocols, simple architecture, protocol analysis, past exploits, and JRE history. Discover techniques for attacking RMI, including registry whitelist bypass, custom services, and JMX flow. Examine specific cases like IBM Websphere Application Server and understand why vendors are unprepared for these threats. Investigate attacks on RMI 45 and 46, focusing on (in)Security Manager and RMI Registry. Analyze exploits, identify vulnerability patterns, and explore the CORBA Naming Service. Gain insights into mitigation strategies and exploit development techniques to enhance your understanding of Java remote protocol security.

Far Sides of Java Remote Protocols

Black Hat
Add to list
0:00 / 0:00