Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

A Journey From JNDI-LDAP Manipulation to Remote Code Execution Dream Land

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of JNDI Reference Injection vulnerabilities in this Black Hat conference talk. Delve into the intricacies of Java Naming and Directory Interface (JNDI) and its potential security risks. Learn about the discovery of this new vulnerability type, initially found in malware samples targeting Java Applets. Understand how attackers can exploit JNDI lookups in web applications to execute arbitrary code on servers. Examine the underlying technology, various exploitation techniques, and attack vectors involving RMI, LDAP, and CORBA services. Discover how LDAP manipulation can be used as an alternative attack vector, even when direct influence over lookup addresses is not possible. Gain insights into attack processes, dynamic protocol switching, and specific vector exploitations. Investigate previous research on click-to-play bypasses and deserialization attacks. Explore CORBA vector limitations, bypasses, and deserialization attacks. Dive deep into LDAP vectors, including lookup vs. search operations, object-returning searches, and Java object decoding. Learn about entry poisoning techniques using serialized objects and JNDI references. Analyze various attack scenarios, including entry manipulation and man-in-the-middle tampering. Conclude with valuable recommendations to mitigate these security risks in enterprise applications.

Syllabus

Intro
JNDI in a Nutshell
JNDI Architecture
JNDI In Action
JNDI Naming References
JNDI Remote Class Loading
Attack Process
Dynamic Protocol Switching
JNDI Vectors
RMI Vector: JNDI Reference Payload
Previous Research: Click-to-play bypass
Previous Research: Deserialization attack
CORBA Vector: IOR
CORBA Vector: Limitations & Bypasses
CORBA Vector: IIOP Listeners
CORBA Vector: Deserialization Attacks
LDAP Vector
Lookup (Naming) vs Search (Directory)
Object-Returning Searches
Java Object Decoding
Java Schema (RFC 2713)
Entry Poisoning with Serialized Objects
Entry Poisoning with JNDI References
Attack Scenarios: Entry Manipulation
Attack Scenarios: MITM Tampering
Recommendations
BlackHat Sound Bytes

Taught by

Black Hat

Reviews

Start your review of A Journey From JNDI-LDAP Manipulation to Remote Code Execution Dream Land

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.