RedKit Java exploit – under the hood

Here I put some technical details about RedKit Java exploit. I will use real sample of captured network traffic. The analysis was done using the following tools: CuckooBox 0.6, Java Decompiler GUI, Wireshark. Don’t follow any URLs in this post! They may still contain the malware. OK, now step 1: a victim visits an infected … Read more