On 09/19/2012 07:55 PM, Pid * wrote:
On 19 Sep 2012, at 13:20, Daniel Mikusa wrote:
On Sep 19, 2012, at 5:02 AM, Ragini wrote:
Hi all,
For my research work I want to have different attacking scenarios which
exploits vulnerability of JAVA based applications. This java applications can
be j
On 19 Sep 2012, at 13:20, Daniel Mikusa wrote:
> On Sep 19, 2012, at 5:02 AM, Ragini wrote:
>
>> Hi all,
>>
>> For my research work I want to have different attacking scenarios which
>> exploits vulnerability of JAVA based applications. This java applications
>> can be just any web-application,
On Sep 19, 2012, at 5:02 AM, Ragini wrote:
> Hi all,
>
> For my research work I want to have different attacking scenarios which
> exploits vulnerability of JAVA based applications. This java applications can
> be just any web-application, desktopapplication or any other.
>
> For this, I was t
On 09/19/2012 01:49 PM, chris derham wrote:
On Wed, Sep 19, 2012 at 10:02 AM, Ragini wrote:For
my research work I want to have different attacking scenarios which
exploits vulnerability of JAVA based applications. This java applications
can be just any web-application, desktopapplication or any
On Wed, Sep 19, 2012 at 10:02 AM, Ragini wrote:For
my research work I want to have different attacking scenarios which
exploits vulnerability of JAVA based applications. This java applications
can be just any web-application, desktopapplication or any other.For this,
I was thinking to exploit vuln
Hi all,
For my research work I want to have different attacking scenarios which
exploits vulnerability of JAVA based applications. This java
applications can be just any web-application, desktopapplication or any
other.
For this, I was thinking to exploit vulnerabilities of tomcat itself
(b