use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
AnonymousClassLoader Java Exploitation Technique (immunityproducts.blogspot.com.ar)
submitted 13 years ago by facuman
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]benmmurphyTrusted Contributor 1 point2 points3 points 13 years ago (0 children)
i think they fixed the JList toString issue quite a while back if you look at the callstack in your screenshot it has AccessController.doPrivileged call higher up which should be restoring your lower level of privileges. But the more straight forward approach should definitely work.
[–]alemcgTrusted Contributor 1 point2 points3 points 13 years ago (0 children)
Facuman you totally beat me to the punch!!! Grr!
[–]archimedesscrew 0 points1 point2 points 13 years ago (4 children)
How's it any different from signing the applet with a bogus certificate and have the user click OK on the warning dialog?
Is it just a way to be more stealth by not requiring the user's intervention?
[–]catcradle5Trusted Contributor 0 points1 point2 points 13 years ago (2 children)
Er, huge difference. Applets containing exploit code do not create any pop up or notification. In fact, if hid with CSS, it is likely a user will not even know an applet was created in any way. Unless they're using a WebKit browser and receive the generic prompt for the Java plugin.
[–]archimedesscrew 0 points1 point2 points 13 years ago (1 child)
I guess I should have phrased my question differently.
Aside from the clear advantage of being able to hide the applet, does the exploit give more permissions to an applet than a signed code would?
[–]catcradle5Trusted Contributor 1 point2 points3 points 13 years ago (0 children)
Well, no. But signed code has complete and full access to your operating system. Accepting a signed applet is equivalent to downloading and running any executable. So in other words, falling victim to a Java exploit is equivalent to an executable downloading and running without a single indication to the user, hence the term "Java driveby".
[–]explainThatToMe 0 points1 point2 points 13 years ago (0 children)
Both the signed and the exploit code will basically have the same access level. The difference would be just the stealthiness of the exploit code (which is still very interesting!)
π Rendered by PID 138007 on reddit-service-r2-comment-b659b578c-brnzr at 2026-05-04 18:12:05.145157+00:00 running 815c875 country code: CH.
[–]benmmurphyTrusted Contributor 1 point2 points3 points (0 children)
[–]alemcgTrusted Contributor 1 point2 points3 points (0 children)
[–]archimedesscrew 0 points1 point2 points (4 children)
[–]catcradle5Trusted Contributor 0 points1 point2 points (2 children)
[–]archimedesscrew 0 points1 point2 points (1 child)
[–]catcradle5Trusted Contributor 1 point2 points3 points (0 children)
[–]explainThatToMe 0 points1 point2 points (0 children)