Then, submit various suitably obfuscated attack strings to the server to
probe for vulnerabilities, as you would for any other parameter.
Coping with Bytecode Obfuscation
Because of the ease with which Java bytecode can be decompiled to recover its
source, various techniques have been developed to obfuscate the bytecode
itself. Applying these techniques results in bytecode that is harder to decom-
pile or that decompiles to misleading or invalid source code that may be very
difficult to understand and impossible to recompile without substantial effort.
For example:
package myapp.interface;
import myapp.class.public;
import myapp.interface.else.class;
import myapp.throw.throw;
import if.if.if.if.else;
import if.if.if.if.if;
import java.awt.event.KeyEvent;
public class double extends public implements strict
{
public double(j j1)
{
_mthif();
_fldif = j1;
Do'stlaringiz bilan baham: |