Insecure RMI

In this lab, you will learn to leverage the RMI registry to gather information about the RMI server's bound name, bruteforce the potentially vulnerable method name, and invoke that method to run arbitrary commands on the RMI server.

Scanning the host with NMAP.

Using the remote methods guesser reveals a custom bound name.

The tool can also be used to guess the method.

Notice that calling remote methods does not create any output by default. To process outputs generated by the call action, you need to use remote-method-guesser's plugin system and register a ResponseHandler. The plugin folder of this repository contains a GenericPrint plugin that is suitable for most situations.

Last updated