Explore
The Honerix infrastructure leverages plugin modules to mimic the behavior of different web applications, trying to push attackers into deploying their malicious payload. This page lists and describes available plugins; by clicking on the plugin name you are redirected to the results for that module.
Tag search
Popular tags
JexBoss detector
Detect exploitation attempts using the JexBoss tool
Ref: https://github.com/joaomatosf/jexboss
Plugin ID: cb6ab62591958ca04e5d3994891aad50
JBoss Web Console Remote Java Deserialization Exploit
JBoss Web Console Remote Java Deserialization Exploit
Plugin ID: 0ff09ed75f6e28ce1e20e5facf919cce
JBoss Worm
Worm exploiting insecure JBoss settings
CVE: CVE-2010-0738
Ref: http://eromang.zataz.com/2011/10/25/jboss-worm-analysis-in-details/
Plugin ID: 9342be4e03f14af0c0caaee8aca75bc0
JBoss JMXInvokerServlet JMXInvoker RCE
JBoss JMXInvokerServlet exploitation attempts.
CVE: N/A
Ref: http://www.cvedetails.com/cve/2007-1036
Plugin ID: 9e3aa0c0da6a04b84434ed37d9262ac6