I spent too much time hacking on Jolokia, so here's an exploitation toolkit, it provides file read, write, rmi injection, information disclosure, and much more. Enjoy!| thinkloveshare.com
Some exploits are just too fun to be true. This first example attempts to exploit a web application through JVM options modification using jolokia coupled with a DOS attack. Fun right? But as explained, this doesn't work, and here's why!| thinkloveshare.com