Groups keyboard shortcuts have been updated
Dismiss
See shortcuts

Tomorrow 18:00 OWASP Stammtisch Stuttgart: Exploiting deserialization vulnerabilities in recent Java versions

15 views
Skip to first unread message

Sven Strittmatter

unread,
Dec 9, 2024, 5:45:51 AM12/9/24
to Germany chapter
Hello 👋

Nothing planned for tomorrow evening? It's OWASP Stammtich Stuttgart
again from 18:00 in the
premises of iteratec GmbH (Zettachring 6, 70567 Stuttgart).

Topic: Exploitation of deserialisation vulnerabilities in current Java
versions

Due to attack techniques such as Insecure Deserialisation and JNDI
Injection,
Java applications have been a favourite target for attackers. However,
recent changes in
Java have rendered many known exploits and attack patterns ineffective
in newer versions.
versions. This presentation will provide an overview of these changes
and discuss which techniques are still
techniques are still useful. It will also discuss how to protect existing
existing Java applications running on current Java versions.

Speaker: Hans-Martin Münch

Hans-Martin Münch is the Managing Director of MOGWAI LABS, a cyber
security boutique specialising in penetration testing.
specialising in penetration testing and technical security audits. In
the past,
Hans-Martin Münch has developed several tools and techniques for
exploiting Java-related
vulnerabilities in JMX or RMI.

Details:
https://www.meetup.com/de-DE/owasp-stuttgart-chapter/events/301313769/

CU
--sven

Reply all
Reply to author
Forward
0 new messages