Defending against Java Deserialization Vulnerabilities

Application Security @LinkedIn
Sep. 25, 2016
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
 Defending against Java Deserialization Vulnerabilities
1 of 36

More Related Content

What's hot

Serial Killer - Silently Pwning your Java Endpoints // OWASP BeNeLux Day 2016Serial Killer - Silently Pwning your Java Endpoints // OWASP BeNeLux Day 2016
Serial Killer - Silently Pwning your Java Endpoints // OWASP BeNeLux Day 2016Christian Schneider
Black Hat EU 2010 - Attacking Java Serialized CommunicationBlack Hat EU 2010 - Attacking Java Serialized Communication
Black Hat EU 2010 - Attacking Java Serialized Communicationmsaindane
Java Deserialization Vulnerabilities - The Forgotten Bug Class (RuhrSec Edition)Java Deserialization Vulnerabilities - The Forgotten Bug Class (RuhrSec Edition)
Java Deserialization Vulnerabilities - The Forgotten Bug Class (RuhrSec Edition)CODE WHITE GmbH
Fixing the Java Serialization Mess Fixing the Java Serialization Mess
Fixing the Java Serialization Mess Salesforce Engineering
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization BlueHat Security Conference
New methods for exploiting ORM injections in Java applicationsNew methods for exploiting ORM injections in Java applications
New methods for exploiting ORM injections in Java applicationsMikhail Egorov

Similar to Defending against Java Deserialization Vulnerabilities

Play frameworkPlay framework
Play frameworkAndrew Skiba
Breakfast cereal for advanced beginnersBreakfast cereal for advanced beginners
Breakfast cereal for advanced beginnersTruptiranjan Nayak
Dynamic Proxy by JavaDynamic Proxy by Java
Dynamic Proxy by JavaKan-Han (John) Lu
Where is my cache architectural patterns for caching microservices by exampleWhere is my cache architectural patterns for caching microservices by example
Where is my cache architectural patterns for caching microservices by exampleRafał Leszko
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldDevOps.com
Aug penguin16Aug penguin16
Aug penguin16alhino

Recently uploaded

D2C Insider Elevate , Global Selling Summit Bengaluru - Developing Brand Posi...D2C Insider Elevate , Global Selling Summit Bengaluru - Developing Brand Posi...
D2C Insider Elevate , Global Selling Summit Bengaluru - Developing Brand Posi...D2C Insider
September 2023 CIAOPS Need to Know WebinarSeptember 2023 CIAOPS Need to Know Webinar
September 2023 CIAOPS Need to Know WebinarRobert Crane
mnNOG 2023: State of IPv6 in MongoliamnNOG 2023: State of IPv6 in Mongolia
mnNOG 2023: State of IPv6 in MongoliaAPNIC
D2C Insider Elevate, Global Selling Summit Bengaluru - Building Your eCommerc...D2C Insider Elevate, Global Selling Summit Bengaluru - Building Your eCommerc...
D2C Insider Elevate, Global Selling Summit Bengaluru - Building Your eCommerc...D2C Insider
AusNOG 2023: A quick look at QUICAusNOG 2023: A quick look at QUIC
AusNOG 2023: A quick look at QUICAPNIC
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdfCS Knowledge

Defending against Java Deserialization Vulnerabilities