Tagged articles
9 articles
Page 1 of 1
IT Services Circle
IT Services Circle
Jun 13, 2025 · Information Security

How a Hidden Log4j Exploit Almost Crippled the Linux Empire – A Security Drama

At dawn a sharp alarm reveals a malicious C2 connection in the Linux empire, prompting a frantic hunt through hidden processes, missing logs, and a secret traffic‑analysis system that uncovers a Log4Shell JNDI exploit launched via port 36560, ultimately exposing mis‑configured ElasticSearch and prompting emergency patches.

JNDILog4Shelllog4j
0 likes · 7 min read
How a Hidden Log4j Exploit Almost Crippled the Linux Empire – A Security Drama
macrozheng
macrozheng
Oct 25, 2024 · Fundamentals

Why and How Java Breaks the Parent Delegation Model: Real-World Scenarios

This article explains the purpose of Java's parent‑delegation class‑loading mechanism, describes its three built‑in loaders, shows how custom loaders can override it, and explores common situations—such as JNDI, JDBC, Tomcat, and OSGi—where developers intentionally break the delegation for flexibility and modularity.

Custom ClassLoaderJDBCJNDI
0 likes · 11 min read
Why and How Java Breaks the Parent Delegation Model: Real-World Scenarios
Top Architect
Top Architect
Dec 23, 2021 · Information Security

Understanding the Critical Log4j2 Vulnerability and Emergency Mitigation Measures

The article explains the Log4j2 remote code execution flaw caused by unsafe JNDI lookups, outlines its widespread impact on Java applications and major Chinese tech firms, and provides concrete emergency mitigation steps such as JVM parameter changes, firewall rules, and upgrading to version 2.17.0.

JNDIJavaRemediation
0 likes · 7 min read
Understanding the Critical Log4j2 Vulnerability and Emergency Mitigation Measures
macrozheng
macrozheng
Dec 23, 2021 · Information Security

Why JNDI Is the Hidden Threat Behind Log4j and Other Java Vulnerabilities

The article explains how JNDI works as a configuration and naming service in Java, shows its use with database drivers, and demonstrates how its SPI mechanism can be abused to load remote code, leading to serious security exploits such as the Log4j vulnerability.

ExploitJNDIJava
0 likes · 6 min read
Why JNDI Is the Hidden Threat Behind Log4j and Other Java Vulnerabilities
Senior Brother's Insights
Senior Brother's Insights
Dec 12, 2021 · Information Security

Unveiling JNDI: From Basics to Real‑World Log4j2 Exploit with RMI

This article explains the fundamentals of Java Naming and Directory Interface (JNDI), its architecture and typical usage, then walks through a step‑by‑step RMI implementation and demonstrates how JNDI can be abused to craft a Log4j2 remote code execution attack, complete with full code samples and mitigation advice.

ExploitJNDIJava
0 likes · 20 min read
Unveiling JNDI: From Basics to Real‑World Log4j2 Exploit with RMI
Programmer DD
Programmer DD
Aug 24, 2021 · Information Security

Fastjson RCE Chains: JdbcRowSetImpl, TemplatesImpl, and BasicDataSource Exploits

This article analyzes three Fastjson deserialization exploit chains—JdbcRowSetImpl, TemplatesImpl, and BasicDataSource—detailing how crafted JSON payloads trigger JNDI lookups, load remote malicious bytecode, and ultimately achieve remote code execution without requiring special Fastjson features.

DeserializationJNDIJava
0 likes · 13 min read
Fastjson RCE Chains: JdbcRowSetImpl, TemplatesImpl, and BasicDataSource Exploits
Java Captain
Java Captain
Jan 6, 2018 · Backend Development

Database Connection Pooling in Java: Concepts, Implementation, and Configuration

This article explains why creating a database connection for each request is inefficient, introduces the concept and configuration of connection pools, provides a custom Java DataSource implementation, and demonstrates the use of popular open‑source pools such as DBCP, C3P0, and Tomcat JNDI with complete code examples.

Connection PoolJDBCJNDI
0 likes · 24 min read
Database Connection Pooling in Java: Concepts, Implementation, and Configuration