Overview
Syllabus
Intro
JNDI in a Nutshell
JNDI Architecture
JNDI In Action
JNDI Naming References
JNDI Remote Class Loading
Attack Process
Dynamic Protocol Switching
JNDI Vectors
RMI Vector: JNDI Reference Payload
Previous Research: Click-to-play bypass
Previous Research: Deserialization attack
CORBA Vector: IOR
CORBA Vector: Limitations & Bypasses
CORBA Vector: IIOP Listeners
CORBA Vector: Deserialization Attacks
LDAP Vector
Lookup (Naming) vs Search (Directory)
Object-Returning Searches
Java Object Decoding
Java Schema (RFC 2713)
Entry Poisoning with Serialized Objects
Entry Poisoning with JNDI References
Attack Scenarios: Entry Manipulation
Attack Scenarios: MITM Tampering
Recommendations
BlackHat Sound Bytes
Taught by
Black Hat