vimarsana.com


May 5, 2021
Back in college, I was very interested in Java bytecode. When I got an internship at Google in 2013, I was skeptical of the security of the Java version of Google App Engine and got permission to spend the last week of my internship doing a mini red team exercise, trying to break into App Engine. This is the story of how I found a vulnerability and developed an exploit to break out of the App Engine sandbox and get arbitrary code execution on a Google server.
Background
One of the reasons I was skeptical was Java’s poor security track record. Java is unusual among programming languages in attempting to do in-process sandboxing with its Applet model, where trusted and untrusted code run within the same language runtime.

Related Keywords

,Google ,Google App Engine ,App Engine ,Java Applets ,Java Virtual Machine ,Compiled Java ,Hello World ,கூகிள் ,கூகிள் செயலி இயந்திரம் ,செயலி இயந்திரம் ,ஜாவா மெய்நிகர் இயந்திரம் ,வணக்கம் உலகம் ,

© 2025 Vimarsana

vimarsana.com © 2020. All Rights Reserved.