Matei Badanoiu

Hacker Deloitte

BIOGRAPHY

Pentester by day and security researcher by night, Matei has spent the past sleepless years (since 2017) living by the motto that “Everything is vulnerable” and has tried to prove that to other people as well by finding and reporting +100 0-day vulnerabilities in softwares of well known vendors (e.g. Oracle, JetBrains, Cisco, VMWare, multiple Apache Projects and many more).

5.0 Shades of Java Exploitation

This presentation focuses on a pentester’s view on how to approach and exploit Java applications by presenting 5 interesting types of Java vulnerabilities that (usually) lead to Remote Code Execution, the tools that help us exploit them and real-life examples of the attacks in actions (CVEs with relevant Proof of Concept).

The 5 topics we will be discussing are:

  • Java Debug Wire Protocol – If NMAP says JDWP, you say PWNED.
  • Deserialization – There are as may ways to serve/insert serialized objects in Java as there are stars in the sky.
  • LDAP – Yep, someone thought it would be a great idea to add complex Java objects and remote “javaCodebase” support to the good ol’ Lightweight Directory Access Protocol. What could go … wrong?
  • RMI – How hard can it be to exploit a protocol that doesn’t even support authentication? Answer: Depends ¯\_(ツ)_/¯
  • JMX – Can do everything RMI can + other cool features (e.g. authentication), but, with great features comes great exploitability.

We will also touch upon subjects as:

  • Why “java.lang.Runtime” does not support pipes or special shell characters (e.g. “|”, “>”, etc.) and how to encode our commands
    A quick peek on how to use tools such as ysoserial, RMG, mjet, and others
  • Analyzing and understanding
  • Deserialization error messages

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Carina Deaconu

Software Engineer Pentest-Tools.com

Radu Tudorica

Security Researcher Bitdefender

Mihail-Iulian Plesa

Security Researcher Orange Services

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES
0

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange Romania is part of the Orange Group, one of the largest global telecommunications operators that connects hundreds of millions of customers worldwide. With over 11 million local customers and an annual turnover exceeding 1.5 billion euros, Orange Romania connects 1 in 2 Romanians and offers an extensive range of communication solutions for both individual and corporate customers, from basic connectivity services to complete mobile, fixed internet, TV packages, and complex IT&C solutions through Orange Business

Orange Romania is the number 1 operator in terms of network performance, and also holds nine consecutive Top Employer certifications, which confirm that Orange Romania, in addition to the remarkable products and services it offers, pays special attention to its employees and working environment. In the past 3 years Orange has launched two 5G Labs in Bucharest and Iasi, that aim to support researchers, startups and companies to test their 5G solutions in advance. 

In addition, Orange is a long-term supporter of the startup ecosystem through the Orange Fab accelerator program designed to support entrepreneurs in the development of innovative products and their distribution locally and internationally.

GOLD PARTNERS

SILVER PARTNER

BRONZE PARTNERS

               

HACKING VILLAGE PARTNERS

EXHIBITOR

COMMUNITY & MEDIA PARTNERS