Главная
Study mode:
on
1
Intro
2
JNDI in a Nutshell
3
JNDI Architecture
4
JNDI In Action
5
JNDI Naming References
6
JNDI Remote Class Loading
7
Attack Process
8
Dynamic Protocol Switching
9
JNDI Vectors
10
RMI Vector: JNDI Reference Payload
11
Previous Research: Click-to-play bypass
12
Previous Research: Deserialization attack
13
CORBA Vector: IOR
14
CORBA Vector: Limitations & Bypasses
15
CORBA Vector: IIOP Listeners
16
CORBA Vector: Deserialization Attacks
17
LDAP Vector
18
Lookup (Naming) vs Search (Directory)
19
Object-Returning Searches
20
Java Object Decoding
21
Java Schema (RFC 2713)
22
Entry Poisoning with Serialized Objects
23
Entry Poisoning with JNDI References
24
Attack Scenarios: Entry Manipulation
25
Attack Scenarios: MITM Tampering
26
Recommendations
27
BlackHat Sound Bytes
Description:
Explore a comprehensive analysis of JNDI Reference Injection vulnerabilities in this Black Hat conference talk. Delve into the intricacies of Java Naming and Directory Interface (JNDI) and its potential security risks. Learn about the discovery of this new vulnerability type, initially found in malware samples targeting Java Applets. Understand how attackers can exploit JNDI lookups in web applications to execute arbitrary code on servers. Examine the underlying technology, various exploitation techniques, and attack vectors involving RMI, LDAP, and CORBA services. Discover how LDAP manipulation can be used as an alternative attack vector, even when direct influence over lookup addresses is not possible. Gain insights into attack processes, dynamic protocol switching, and specific vector exploitations. Investigate previous research on click-to-play bypasses and deserialization attacks. Explore CORBA vector limitations, bypasses, and deserialization attacks. Dive deep into LDAP vectors, including lookup vs. search operations, object-returning searches, and Java object decoding. Learn about entry poisoning techniques using serialized objects and JNDI references. Analyze various attack scenarios, including entry manipulation and man-in-the-middle tampering. Conclude with valuable recommendations to mitigate these security risks in enterprise applications. Read more

A Journey From JNDI-LDAP Manipulation to Remote Code Execution Dream Land

Black Hat
Add to list
0:00 / 0:00