This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our terms.

Dismiss

Explore


The Honerix infrastructure leverages plugin modules to mimic the behavior of different web applications, trying to push attackers into deploying their malicious payload. This page lists and describes available plugins; by clicking on the plugin name you are redirected to the results for that module.

Tag search

Popular tags

JexBoss detector

Detect exploitation attempts using the JexBoss tool

Ref: https://github.com/joaomatosf/jexboss

Plugin ID: cb6ab62591958ca04e5d3994891aad50


JBoss Web Console Remote Java Deserialization Exploit

JBoss Web Console Remote Java Deserialization Exploit

Plugin ID: 0ff09ed75f6e28ce1e20e5facf919cce


JBoss Worm

Worm exploiting insecure JBoss settings

CVE: CVE-2010-0738

Ref: http://eromang.zataz.com/2011/10/25/jboss-worm-analysis-in-details/

Plugin ID: 9342be4e03f14af0c0caaee8aca75bc0


JBoss JMXInvokerServlet JMXInvoker RCE

JBoss JMXInvokerServlet exploitation attempts.

CVE: N/A

Ref: http://www.cvedetails.com/cve/2007-1036

Plugin ID: 9e3aa0c0da6a04b84434ed37d9262ac6