BaRMIe Poking Java's Back Door Nicky Bloor

Subscribers:
6,610
Published on ● Video Link: https://www.youtube.com/watch?v=T-VYiEIqIEY



Duration: 42:10
11 views
0


Java's Remote Method Invocation (RMI) enables developers to seamlessly interact with objects that reside within another Java Virtual Machine (JVM), potentially on a remote server. As is often the case, the trade-off for seamless remote method invocation is security. While many consider RMI to be outdated and uninteresting, many in-service implementations remain trivial to exploit, and there are many questions to consider. How common is RMI? How many RMI services are making the same mistakes when it comes to security? What else could I do with arbitrary RMI services? Can RMI services be secured, and if so, how? I set about finding answers to those questions. Along the way I wrote a tool to help with enumeration of RMI services, called BaRMIe, which eventually became an exploitation tool following the discovery of vulnerabilities within Java itself. During this talk I'll look at the work I did and present the results of my research including answers to my original questions and the exploitation tool I wrote, BaRMIe.


Presenters:
Nicky Bloor

44 con 2017 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
information
hack
online
crime
code
concept
thief
protection
network
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Nicky Bloor
Java
Java Virtual Machine