RmiTaste: detect, enumerate, interact and attack RMI services
RmiTaste allows security professionals to detect, enumerate, interact, and attack RMI services by calling remote methods with gadgets from ysoserial. It also allows calling remote methods with specific parameters.
RmiTaste was written to aid security professionals in identifying insecure RMI services on systems that the user has prior permission to attack. Unauthorized access to computer systems is illegal and it must be used in accordance with all relevant laws. Failure to do so could lead to you being prosecuted. The developers of RmiTaste assume no liability and are not responsible for any misuse or damage caused by this program.
RmiTaste has 4 modes: conn, enum, attack, and call. Each mode has a separate help.
Conn mode allows checking if the port is an RMI service port.
Enum mode allows fetching information about RMI service such as remote objects names and classes names that remote object implements or extends. If the interface implemented by a remote object is available in RmiTaste classpath then RmiTaste will print all remote methods that you can call on this remote object.
Attack mode allows calling a remote method with a specific gadget chains from ysoserial. Assume that the remote object has the following methods:
Option “-gen bruteforce” allows to brute force remote method with gadgets from ysoserial. In this example, deposit method will be called multiple times with gadgets from ysoserial.
Call mode allows calling a specific method on RMI remote objects. Assume that the remote object has the following methods:
Copyright (c) 2020 STM Solutions