04-06-2012, 02:45 PM
Following 3 scenarios are discussed:
1. Java Signed Applet Attack against older JRE versions.
2. Java Signed Applet Attack against newer JRE versions.
3. Java Rhino Script Engine Exploit attack against newer JRE versions.
Some network forensics techniques are also used to investigate into the malicious Java code sent from Attacker's Web Server to the Victim's Machine."
Spesial Thanks For c0d3inj3cT