Re: exploting tomcat vulnerability with example

2012-09-20 Thread Ragini
On 09/19/2012 07:55 PM, Pid * wrote: On 19 Sep 2012, at 13:20, Daniel Mikusa wrote: On Sep 19, 2012, at 5:02 AM, Ragini wrote: Hi all, For my research work I want to have different attacking scenarios which exploits vulnerability of JAVA based applications. This java applications can be j

Re: exploting tomcat vulnerability with example

2012-09-19 Thread Pid *
On 19 Sep 2012, at 13:20, Daniel Mikusa wrote: > On Sep 19, 2012, at 5:02 AM, Ragini wrote: > >> Hi all, >> >> For my research work I want to have different attacking scenarios which >> exploits vulnerability of JAVA based applications. This java applications >> can be just any web-application,

Re: exploting tomcat vulnerability with example

2012-09-19 Thread Daniel Mikusa
On Sep 19, 2012, at 5:02 AM, Ragini wrote: > Hi all, > > For my research work I want to have different attacking scenarios which > exploits vulnerability of JAVA based applications. This java applications can > be just any web-application, desktopapplication or any other. > > For this, I was t

Re: exploting tomcat vulnerability with example

2012-09-19 Thread Ragini
On 09/19/2012 01:49 PM, chris derham wrote: On Wed, Sep 19, 2012 at 10:02 AM, Ragini wrote:For my research work I want to have different attacking scenarios which exploits vulnerability of JAVA based applications. This java applications can be just any web-application, desktopapplication or any

Re: exploting tomcat vulnerability with example

2012-09-19 Thread chris derham
On Wed, Sep 19, 2012 at 10:02 AM, Ragini wrote:For my research work I want to have different attacking scenarios which exploits vulnerability of JAVA based applications. This java applications can be just any web-application, desktopapplication or any other.For this, I was thinking to exploit vuln

exploting tomcat vulnerability with example

2012-09-19 Thread Ragini
Hi all, For my research work I want to have different attacking scenarios which exploits vulnerability of JAVA based applications. This java applications can be just any web-application, desktopapplication or any other. For this, I was thinking to exploit vulnerabilities of tomcat itself (b