Tools Exploits Advisories Articles Home 

Exploits  ->  DNS Rebinding against Java Applet: Online Demonstration



Requirements


- JavaScript and Java turned on
- You need to access using an HTTP proxy server
- Does not work on JRE1.6.0_03 or later



Overview


On this demo the applet scans some ports and get banners, and send the information to the attackers website( www.jumperz.net ).
TARGET PORTS: 21,22,23,25,80,110,135,139,143,445,3306,5432,8080,1080

Input your private IP address of the target machine and click 'start'.






Browsers tested


Opera9.23 / JRE1.6.0_02 / Windows2000SP4
IE6.0 / JRE1.6.0_02 / Windows2000SP4
Firefox2.0.0.8 / JRE1.6.0_02 / Windows2000SP4





>> Tools:
Doorman Eclipse Plugin
Amberjack@JUMPERZ.NET
Guardian@JUMPERZ.NET


>> Latest files:
MonjaDB


>> Contact:
Kanatoko
twitter: @kinyuka


Copyrightę 1998-2012 JUMPERZ.NET All Rights Reserved.