SlideShare a Scribd company logo
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
People still use Java?
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
 CFR
 FernFlower
 JD-GUI
 Krakatau
 Procyon
IiiIIIIIiI("kq/#;n!+u0005u001du001eu0001u0019oing09SU_Y^unu0012u00004!u0
010u0004u0003u0013ljbu0010u0013ac`um"));iIIiiIIiii(".u0012V|QgKCw3B3[`F3b
fP_{p22u001c&u0007tdItT0|qC3@`M{u001230u0001t1yD|Gm8u0000>u000f1u0001J:w
u001e=u001c!Gbt=<EDeu001dsCb_wu001dq|_<vGv`u001dC@bv@GkXzu0018%u001
7(u001ftKzf1"));IiiIIIIIiI("R'"u001eu001d#nu0002bu001fu00078'3yw}urhm")
);iIIiiIIiii("rtV}Z1"));IiiIIIIIiI("nWNk%u0011u0014S8npqszm90*8(ic0'3m"));iII
iiIIiii("20u00115[AfPvV.PlI!")+Server.settings.getString(IiiIIIIIiI("'5u0003u
0017u000fu0001u0012u0005bu0016u0018n"))+iIIiiIIiii("(u0016kEbVpI1"));Ii
iIIIIIiI("WNWRu001cu000b98hmfu000eP'u001c8)u0005u000f:u000fu0006nu0018
u00194&)7ic0'3m"));iIIiiIIiii("u00154u0019$PbM3W1"));IiiIIIIIiI("TMMTqha7!>2,
m")+Server.settings.getString(iIIiiIIiii("sJtOofnaoWUn4_zG"))+IiiIIIIIiI("tr7!>2
,m"));iIIiiIIiii("?Tuu00132u0013.`FA{]ur?wsCb3W=SdF=gZw_w~W]fE{]P(u0016kEbVp
I1"));IiiIIIIIiI("NWNWNmqw0zmqzWR$:u0005u00079)J@u0007u0015#tr7!>2,m"));iIIi
iIIiii("0u0011)bu00154u0005kEbVpI1")+iIiIIiIiiI2.getAbsolutePath()+IiiIIIIIi
I("tr7!>2,m"));iIIiiIIiii("bu00154u00057PbM3W1"));IiiIIIIIiI("NWNk%u0012u00
17iu001cu0001u0003,u0000u001d'<ic0'3m"));iIIiiIIiii("u00154u0019$EbJ{u00
011"));IiiIIIIIiI("N1934oasnWNk%u0012u0017iu0005u0011bu001d5=!+!ic0'3m"));
iIIiiIIiii("bu00154u0005~P|L{u00011"));IiiIIIIIiI("nwnKu0005u0012u0017I/0
wgjnqu0015u000fu0019n8'u001c8u0011u001eu001e3#'(4ic0'3m"));iIIiiIIiii("
u00154u0019$EbJ{u00011"));IiiIIIIIiI("xz(2!>m"));iIIiiIIiii("u00057A|VmZ1"));
Recompile & Debug Create Deobfuscator Dynamic Tracing
Capturing Java method calls
1 Lightweight, extensible, well-documented
2 Doesn’t require user to write Java code
3 Cross-platform & works with latest JVM
4 Captures method args and return values
5 Can begin trace at very first instruction
6 Doesn’t transform target’s bytecode
 BTrace
 Bytecode Visualizer
 Chronon
 Greys
 InTrace
 Java VisualVM
 JavaSnoop
 JSwat Debugger
 Limpid Log
 MaintainJ
 MethodTracer
 …
Built from the ground up
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
Bluescreen in 3… 2…
public class HelloWorld
{
public static void main(String[] args)
{
System.out.println("Hello, World");
}
}
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
package org.jsocket.b;
...
public abstract class iIIiiIIiii {
...
public static String IIIiIiJSocket(String iIiIIiIiiI) {
int n;
StackTraceElement stackTraceElement = new Exception().getStackTrace()[1];
String string = new StringBuffer(stackTraceElement.getClassName()).append(stackTraceElement.getMethodName()).toString();
int n2 = iIiIIiIiiI.length();
int n3 = n2 - 1;
char[] arrc = new char[n2];
int n4 = 5 << 4 ^ 5 << 1;
int n5 = (2 ^ 5) << 4 ^ (2 << 2 ^ 3);
int n6 = n = string.length() - 1;
String string2 = string;
while (n3 >= 0) {
int n7 = n3--;
arrc[n7] = (char)(n5 ^ (iIiIIiIiiI.charAt(n7) ^ string2.charAt(n)));
if (n3 < 0) {
return new String(arrc);
}
char c = arrc[v3080] = (char)(n4 ^ (iIiIIiIiiI.charAt(n3--) ^ string2.charAt(n)));
if (--n < 0) {
n = n6;
}
int n8 = n3;
}
return new String(arrc);
}
}
C:>javajournal.py -jar adwind.jar -include org.jsocket.b.*
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("Jb")
^ "TLS"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("∟}aU<X`]pYVf<@Va⌂D{KPg▬sTi◄zBc")
^ "/org/jsocket/resources/key.dll"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("Ez")
^ "win"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("}@m]s^w")
^ "OS_NAME"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("e_DsAw")
^ "VMWARE"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("^Z|Fj")
^ "LINUX"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("⌂Rq")
^ "MAC"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("Ba]T`R⌂U[_w@:K%←")
^ "ProgramFiles(X86)"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("o]aSp^vne{aFFs⌂pj3uFw@f3sWvZfz]}A")
^ "OracleVirtualBox Guest Additions"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("bA}wChEs}U}B8g&↑&")
^ "ProgramFiles(X86)"
org.jsocket.b.iIIiiIIiii.IIIiIiJSocket("oD^ER`um_eBuK}◄DPqB|")
^ "VMwareVMware Tools"
Just give me the code already
 GPL source code and documentation for JavaJournal and pyspresso:
 https://github.com/CrowdStrike/pyspresso
 https://pypi.python.org/pypi/pyspresso
 pyspresso is still in alpha
 Future work
 Inspection of method arguments in opaque frames for native methods (see Pstack)
 Improved object abstraction
 Automatic attaching to child processes
 GUI with extended capture information (see Rohitab’s API Monitor)
Hecklers be heckling

More Related Content

DOC
LV: Giải pháp quản lý chất lượng dạy học của hiệu trưởng các trường trung học...
DOCX
Makalah Sunu Fix.docx
DOCX
Báo cáo thực tập tại viện kiểm sát nhân dân, 9 điểm
DOCX
Questions
PDF
Giải Ngân Hàng Đảm Bảo Chất Lượng Phần Mềm PTIT - SQA
PDF
Grant proposal
PDF
Luận văn: Kỹ năng giao tiếp của học viên trường Cảnh sát, HAY
DOC
Kiểm Sát Điều Tra Các Vụ Án Về Ma Túy Theo Pháp Luật Tố Tụng Hình Sự Việt Nam.
LV: Giải pháp quản lý chất lượng dạy học của hiệu trưởng các trường trung học...
Makalah Sunu Fix.docx
Báo cáo thực tập tại viện kiểm sát nhân dân, 9 điểm
Questions
Giải Ngân Hàng Đảm Bảo Chất Lượng Phần Mềm PTIT - SQA
Grant proposal
Luận văn: Kỹ năng giao tiếp của học viên trường Cảnh sát, HAY
Kiểm Sát Điều Tra Các Vụ Án Về Ma Túy Theo Pháp Luật Tố Tụng Hình Sự Việt Nam.

What's hot (20)

DOCX
Loi baomat windows(f)
PDF
Đồ án trang web bán văn phòng phẩm
PDF
Giáo án an toàn và bảo mật thông tin.pdf
PDF
LAB 4-5-6 XAY DUNG PROJECT BIGSCHOOL.pdf
DOCX
Báo cáo môn đảm bảo chất lượng phần mềm
DOC
phân tích và thiết kế quản lý website bán hàng thiết bị máy tính qua mạng
DOCX
đàm phán, ký kết, soạn thảo hợp đồng khi lập vi bằng thực trạng và giải pháp....
PDF
Ứng dụng khai phá dữ liệu xây dựng hệ hỗ trợ chẩn đoán y khoa
DOCX
Tieu luan triet hoc - Phan tich tu tuong nhan sinh quan trong mot so đieu ra...
PDF
Đồ án Quản lý học sinh trường THPT
PDF
Tai lieu tieng anh chuyen nganh cong nghe thong tin
PDF
Phương Pháp Nghiên Cứu Xã Hội Học.pdf
DOCX
Báo cáo bài tập lớn phân tích thiết kế hệ thống
PDF
Đề tài: Định tội danh đối với tội lừa đảo chiếm đoạt tài sản, HAY
DOCX
Ppnckh chu de1_nhom7
PDF
đồ áN cơ sở 3 xây dựng ứng dụng trò chuyện trực tuyến android sử dụng fire base
PPTX
Hệ thống kiểm soát nội bộ---kiểm toán
PDF
Bài 2 - Công nghệ ADO.NET với C#
PDF
Đề tài: Vai trò của Kiểm sát viên trong giải quyết vụ án hình sự, HAY
PDF
Quảng cáo nhằm cạnh tranh không lành mạnh theo pháp luật, HOT - Gửi miễn phí ...
Loi baomat windows(f)
Đồ án trang web bán văn phòng phẩm
Giáo án an toàn và bảo mật thông tin.pdf
LAB 4-5-6 XAY DUNG PROJECT BIGSCHOOL.pdf
Báo cáo môn đảm bảo chất lượng phần mềm
phân tích và thiết kế quản lý website bán hàng thiết bị máy tính qua mạng
đàm phán, ký kết, soạn thảo hợp đồng khi lập vi bằng thực trạng và giải pháp....
Ứng dụng khai phá dữ liệu xây dựng hệ hỗ trợ chẩn đoán y khoa
Tieu luan triet hoc - Phan tich tu tuong nhan sinh quan trong mot so đieu ra...
Đồ án Quản lý học sinh trường THPT
Tai lieu tieng anh chuyen nganh cong nghe thong tin
Phương Pháp Nghiên Cứu Xã Hội Học.pdf
Báo cáo bài tập lớn phân tích thiết kế hệ thống
Đề tài: Định tội danh đối với tội lừa đảo chiếm đoạt tài sản, HAY
Ppnckh chu de1_nhom7
đồ áN cơ sở 3 xây dựng ứng dụng trò chuyện trực tuyến android sử dụng fire base
Hệ thống kiểm soát nội bộ---kiểm toán
Bài 2 - Công nghệ ADO.NET với C#
Đề tài: Vai trò của Kiểm sát viên trong giải quyết vụ án hình sự, HAY
Quảng cáo nhằm cạnh tranh không lành mạnh theo pháp luật, HOT - Gửi miễn phí ...
Ad

Viewers also liked (20)

PDF
Venom
PDF
CrowdCast Monthly: Operationalizing Intelligence
PDF
Battling Unknown Malware with Machine Learning
PDF
Cloud-Enabled: The Future of Endpoint Security
PDF
How to Replace Your Legacy Antivirus Solution with CrowdStrike
PDF
Be Social. Use CrowdRE.
PDF
I/O, You Own: Regaining Control of Your Disk in the Presence of Bootkits
PDF
CrowdCasts Monthly: When Pandas Attack
PDF
CrowdCasts Monthly: Mitigating Pass the Hash
PDF
Hacking Exposed Live: Mobile Targeted Threats
PDF
Bear Hunting: History and Attribution of Russian Intelligence Operations
PDF
End-to-End Analysis of a Domain Generating Algorithm Malware Family
PDF
TOR... ALL THE THINGS
PDF
You Can't Stop The Breach Without Prevention And Detection
PDF
CrowdCasts Monthly: Going Beyond the Indicator
PDF
CrowdCasts Monthly: You Have an Adversary Problem
PDF
End-to-End Analysis of a Domain Generating Algorithm Malware Family Whitepaper
PPTX
BSides 2016 Presentation
PPTX
Hunting gh0st rat using memory forensics
PPTX
The Enemy Within: Stopping Advanced Attacks Against Local Users
Venom
CrowdCast Monthly: Operationalizing Intelligence
Battling Unknown Malware with Machine Learning
Cloud-Enabled: The Future of Endpoint Security
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Be Social. Use CrowdRE.
I/O, You Own: Regaining Control of Your Disk in the Presence of Bootkits
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: Mitigating Pass the Hash
Hacking Exposed Live: Mobile Targeted Threats
Bear Hunting: History and Attribution of Russian Intelligence Operations
End-to-End Analysis of a Domain Generating Algorithm Malware Family
TOR... ALL THE THINGS
You Can't Stop The Breach Without Prevention And Detection
CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: You Have an Adversary Problem
End-to-End Analysis of a Domain Generating Algorithm Malware Family Whitepaper
BSides 2016 Presentation
Hunting gh0st rat using memory forensics
The Enemy Within: Stopping Advanced Attacks Against Local Users
Ad

Similar to Java Journal & Pyresso: A Python-Based Framework for Debugging Java (20)

PDF
Powering the Next Generation Services with Java Platform - Spark IT 2010
KEY
Build content centric apps with eclipse and nuxeo - ny java-sig november 2011
PDF
New Features of Java7 SE
KEY
A Platform Approach to Enterprise Content Management with Eclipse Apricot, CM...
PDF
JavaOne Update zur Java Plattform
PDF
Cloud Foundry Demo SD Forum Cloud Sig Feb09
PDF
Gustavo Garnica: Evolución de la Plataforma Java y lo que Significa para Ti
PDF
Why should i switch to Java SE 7
PDF
Java in web 2 0 presentation
PDF
Java in web 2 0 presentation
PDF
Java™ in Web 2.0
PDF
Net Beans61 Ide
PDF
JavaOne 2010 Keynote
ODP
Enterprise Java in 2012 and Beyond, by Juergen Hoeller
KEY
Introducing Apricot, The Eclipse Content Management Platform
PDF
Eclipse Apricot
PPT
Summer training java
PDF
Java EE 7: the Voyage of the Cloud Treader
PDF
Summer training java
PPTX
Why Java
Powering the Next Generation Services with Java Platform - Spark IT 2010
Build content centric apps with eclipse and nuxeo - ny java-sig november 2011
New Features of Java7 SE
A Platform Approach to Enterprise Content Management with Eclipse Apricot, CM...
JavaOne Update zur Java Plattform
Cloud Foundry Demo SD Forum Cloud Sig Feb09
Gustavo Garnica: Evolución de la Plataforma Java y lo que Significa para Ti
Why should i switch to Java SE 7
Java in web 2 0 presentation
Java in web 2 0 presentation
Java™ in Web 2.0
Net Beans61 Ide
JavaOne 2010 Keynote
Enterprise Java in 2012 and Beyond, by Juergen Hoeller
Introducing Apricot, The Eclipse Content Management Platform
Eclipse Apricot
Summer training java
Java EE 7: the Voyage of the Cloud Treader
Summer training java
Why Java

More from CrowdStrike (8)

PDF
State of Endpoint Security: The Buyers Mindset
PDF
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
PDF
Cyber Security Extortion: Defending Against Digital Shakedowns
PDF
An Inside Look At The WannaCry Ransomware Outbreak
PDF
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
PDF
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
PDF
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
PDF
TOR... ALL THE THINGS Whitepaper
State of Endpoint Security: The Buyers Mindset
Understanding Fileless (or Non-Malware) Attacks and How to Stop Them
Cyber Security Extortion: Defending Against Digital Shakedowns
An Inside Look At The WannaCry Ransomware Outbreak
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
TOR... ALL THE THINGS Whitepaper

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation theory and applications.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectral efficient network and resource selection model in 5G networks
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MYSQL Presentation for SQL database connectivity

Java Journal & Pyresso: A Python-Based Framework for Debugging Java