Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Afant1/RemoteObjectInvocationHandler
bypass JEP290 RaspHook code
https://github.com/Afant1/RemoteObjectInvocationHandler
Last synced: 22 days ago
JSON representation
bypass JEP290 RaspHook code
- Host: GitHub
- URL: https://github.com/Afant1/RemoteObjectInvocationHandler
- Owner: Afant1
- Created: 2020-03-13T07:03:22.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2020-09-21T20:58:42.000Z (about 4 years ago)
- Last Synced: 2024-08-05T17:26:44.030Z (4 months ago)
- Language: Java
- Size: 261 KB
- Stars: 65
- Watchers: 2
- Forks: 9
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - Afant1/RemoteObjectInvocationHandler - bypass JEP290 RaspHook code (Java)
README
# RemoteObjectInvocationHandler
bypass JEP290 RaspHook code,Hook InvokeRemoteMethod 函数,替换成URLDNS gadget
## Usage
**1、mvn package 打好jar包****2、运行RmiServer**
**3、运行RmiClient前,VM options参数填写:-javaagent:C:\Users\xxx\InvokeRemoteMethod\target\rasp-1.0-SNAPSHOT.jar**
**4、最终会hook住RemoteObjectInvocationHandler函数,修改第三个参数为URLDNS gadget**
**bypass jep290攻击rmi文章已首发在安全客:https://www.anquanke.com/post/id/200860**
参考链接:
https://mogwailabs.de/blog/2019/03/attacking-java-rmi-services-after-jep-290/
https://github.com/linxin26/javarespdemo/