Understanding the Java Serialization Attack Surface

Presented at Kiwicon 4: The four e:Sheep-persons of the Cyber Infopocalypse (2010), Nov. 27, 2010, 10 a.m. (45 minutes)

We have recently been asked to perform a number of security assessments which use Java serialized objects to communicate information between client and server. This approach is quite common, particularly in applications which implement some form of thick(ish) client. However, personally, whenever I see these things flying across my proxy I always get excited and think "there has to be something wrong here…" So is there something really wrong? What should we be concentrating on when trying to attack these applications?


Presenters:

Links:

Similar Presentations: