Java Exploits/Research

This researcher is a new myth for me: @jduck1337

This paper is very interesting, and it is something I was thinking about since 3-4 years… Exploiting memory corruptions in java is always something very fascinating to me.

http://www.accuvant.com/capability/accuvant-labs/security-research/featured-presentation/exploiting-java-memory-corruption-vulnerabilities

Another interesting & extremely clever work, @mihi42 Java RMI exploit, which takes advantage about default Java RMI configuration; it is very different from Joshua’s work, but it coult be devastating in some environment…

http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/java_rmi_server.rb

 

This work by @mihi42 makes possible to run Java code outside the sandbox, exploiting a design flaw in Mozilla Rhino Script engine:

http://schierlm.users.sourceforge.net/CVE-2011-3544.html

 

 

 

Advertisements

2 thoughts on “Java Exploits/Research

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s