![Java RMI for pentesters: structure, recon and communication (non-JMX Registries). | by AFINE | ITNEXT Java RMI for pentesters: structure, recon and communication (non-JMX Registries). | by AFINE | ITNEXT](https://www.assignmentpoint.com/wp-content/uploads/2020/07/Remote-Method-Invocation.jpg)
Java RMI for pentesters: structure, recon and communication (non-JMX Registries). | by AFINE | ITNEXT
![Java Deserialization Exploits: Registry Whitelist Bypass - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. Java Deserialization Exploits: Registry Whitelist Bypass - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.](https://nsfocusglobal.com/wp-content/uploads/2020/06/0525-2.jpg)
Java Deserialization Exploits: Registry Whitelist Bypass - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
![JNDI Injection Series: RMI Vector - Dynamic Class Loading From Remote URL | by Yani | InfoSec Write-ups JNDI Injection Series: RMI Vector - Dynamic Class Loading From Remote URL | by Yani | InfoSec Write-ups](https://miro.medium.com/v2/resize:fit:1400/1*jLRgHuxRjILRo3T8LLZaVg.png)
JNDI Injection Series: RMI Vector - Dynamic Class Loading From Remote URL | by Yani | InfoSec Write-ups
![JNDI Injection Series: RMI Vector - Dynamic Class Loading From Remote URL | by Yani | InfoSec Write-ups JNDI Injection Series: RMI Vector - Dynamic Class Loading From Remote URL | by Yani | InfoSec Write-ups](https://miro.medium.com/v2/resize:fit:1400/1*9kFvy7wDDkB8tU2mvgr5sw.png)