SlideShare a Scribd company logo
Middleware hacking
Agenda
• what is Middleware?
• Vendors for Middleware?
• Where it stands in a picture?
• Types of Middleware?
• Vulnerabilities in Middleware?
• Importance of middleware patching?
What is Middleware ?
What is Middleware?
Middleware is the software that connects software components or enterprise applications. Middleware is the
software layer that lies between the operating system and the applications on each side of a distributed
computer network Typically, it supports complex, distributed business software applications.
https://docs.oracle.com/cd/E15523_01/core.1111/e10103/intro.htm#BABEICDD
Servers / Client This is middleware in my understanding.. 
Vendors for Middleware?
Where Middleware stands in picture
M
I
D
D
L
E
W
A
R
E
Where Middleware stands in picture
KERNEL
Network OS Service
Middleware
Distributed Application
Types of Middleware?
OBJECT Oriented Middleware
RPC (remote procedure call)
MOM Message oriented Middleware
Event based Middleware
RPC (remote procedure call)
http://p.motionelements.com/stock-video/nature/me705539-inside-mcdonald-s-restaurant-hd-a0252.jpg
RPC (remote procedure call)
APPLICATION
CALL(function)
CLIENT STUB
marshalling
(network portable format)
RPC RPC
SERVER STUB
unmarshalling
Function execute
and result
PROS
* Distributed application
* can call any function from
anywhere
CONS
• Platform Dependent
• Language Dependent
RPC
RPC call
Live Example RPC
OBJECT Oriented Middleware (ORB)
CORBA The Common Object Request Broker Architecture
OBJECT Oriented Middleware (ORB)
CORBA The Common Object Request Broker Architecture BY OMG Group
PROS
• Platform Independent
• Language Independent
• ORB :- Object request broker
• IIOP :- internet inter operable protocol.
APPLICATION
CALL(function)
CLIENT STUB
ORB ORB
Skeleton
Function execute
and result
IIOP :- internet inter operable protocol.
IDL
Live Example ORB
COM/DCOM
PROS
• MSIDL:- Microsoft IDL
• DCE-RCP :-distributed computing Env-R.
CLIENT
Proxy
COM runtime lib in
windows NT
COM runtime lib in
windows NT
STUB
Function execute
and result
DCE-RPC
Component object module and distributed component Object Module
MSIDL
Enterprise JAVA Bean
JAVA RMI (Remote Method Invocation)
PROS
• Platform Independent
• JAVA RMI .
WEB Browser
WEB APP
RMI registry/ JVM RMI registry/ JVM
JDBC
DATABASE
IDL
RMI-IIOP
Vulnerabilities in Middleware
ISSUES
• OVERFLOWS
• WEB Application TOP 10
• Architecture flow
• Say No to Scanner’s
Importance of middleware patching?
Thank You…! 

More Related Content

PPTX
Web app presentation
DOCX
Ralph_Cencebaugh Resume
PPTX
Types of software, advantages and disadvantages
DOCX
Michael Tillett Resume4
PPTX
59 ways to publish an application v0.9
DOCX
jeffrey.glover.resume
DOC
Maged Bishay - Resume 2015
PPTX
Middleware final
Web app presentation
Ralph_Cencebaugh Resume
Types of software, advantages and disadvantages
Michael Tillett Resume4
59 ways to publish an application v0.9
jeffrey.glover.resume
Maged Bishay - Resume 2015
Middleware final

Similar to Middleware hacking (20)

DOCX
Middleware – Its Types, Architecture, and Benefits.docx
PPT
middleware-technologies-8871-AmKEtL9-_1_.ppt
PDF
Middleware Technology and its importants
PPT
Middleware
PPT
middleware in embedded systems
PDF
Communication middleware
PPT
Unit_2_Midddleware_2.ppt
PPTX
Manish tripathi-e-commerce-middleware
 
PPTX
Pervasive middleware
PDF
Middleware1
PPT
12-middleware.ppt
PPT
middleware
PPTX
Middleware Technologies ppt
ODP
Middleware1
ODP
Middleware
PPT
IntroJan14.ppt
PPT
INTERPROCESS COMMUNICATION INTERPROCESS COMMUNICATION INTERPROCESS COMMUNICATION
PPT
MIDELWARE TECH
PPTX
The Middleware technology that connects the enterprise
PPT
client-server-architecture.ppt
Middleware – Its Types, Architecture, and Benefits.docx
middleware-technologies-8871-AmKEtL9-_1_.ppt
Middleware Technology and its importants
Middleware
middleware in embedded systems
Communication middleware
Unit_2_Midddleware_2.ppt
Manish tripathi-e-commerce-middleware
 
Pervasive middleware
Middleware1
12-middleware.ppt
middleware
Middleware Technologies ppt
Middleware1
Middleware
IntroJan14.ppt
INTERPROCESS COMMUNICATION INTERPROCESS COMMUNICATION INTERPROCESS COMMUNICATION
MIDELWARE TECH
The Middleware technology that connects the enterprise
client-server-architecture.ppt

More from nullowaspmumbai (20)

PDF
ELK in Security Analytics
PPTX
Switch security
PPTX
Radio hacking - Part 1
PPTX
How I got my First CVE
PPTX
Power forensics
PPTX
Infrastructure security & Incident Management
PPTX
Internet censorship circumvention techniques
PPTX
How i got my first cve
PPTX
Adversarial machine learning updated
PPTX
PPTX
Adversarial machine learning
PPTX
Dll Hijacking
PPTX
Abusing Target
PDF
NTFS Forensics
PPTX
Drozer - An Android Application Security Tool
PPTX
Middleware hacking
PDF
Ganesh naik linux_kernel_internals
PDF
Buffer overflow null
PDF
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
ELK in Security Analytics
Switch security
Radio hacking - Part 1
How I got my First CVE
Power forensics
Infrastructure security & Incident Management
Internet censorship circumvention techniques
How i got my first cve
Adversarial machine learning updated
Adversarial machine learning
Dll Hijacking
Abusing Target
NTFS Forensics
Drozer - An Android Application Security Tool
Middleware hacking
Ganesh naik linux_kernel_internals
Buffer overflow null
Null Mumbai Meet_Android Reverse Engineering by Samrat Das

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Approach and Philosophy of On baking technology
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
Programs and apps: productivity, graphics, security and other tools
Approach and Philosophy of On baking technology
Electronic commerce courselecture one. Pdf
NewMind AI Weekly Chronicles - August'25 Week I
Network Security Unit 5.pdf for BCA BBA.

Middleware hacking

  • 2. Agenda • what is Middleware? • Vendors for Middleware? • Where it stands in a picture? • Types of Middleware? • Vulnerabilities in Middleware? • Importance of middleware patching?
  • 3. What is Middleware ? What is Middleware? Middleware is the software that connects software components or enterprise applications. Middleware is the software layer that lies between the operating system and the applications on each side of a distributed computer network Typically, it supports complex, distributed business software applications. https://docs.oracle.com/cd/E15523_01/core.1111/e10103/intro.htm#BABEICDD Servers / Client This is middleware in my understanding.. 
  • 5. Where Middleware stands in picture M I D D L E W A R E
  • 6. Where Middleware stands in picture KERNEL Network OS Service Middleware Distributed Application
  • 7. Types of Middleware? OBJECT Oriented Middleware RPC (remote procedure call) MOM Message oriented Middleware Event based Middleware
  • 8. RPC (remote procedure call) http://p.motionelements.com/stock-video/nature/me705539-inside-mcdonald-s-restaurant-hd-a0252.jpg
  • 9. RPC (remote procedure call) APPLICATION CALL(function) CLIENT STUB marshalling (network portable format) RPC RPC SERVER STUB unmarshalling Function execute and result PROS * Distributed application * can call any function from anywhere CONS • Platform Dependent • Language Dependent RPC
  • 11. OBJECT Oriented Middleware (ORB) CORBA The Common Object Request Broker Architecture
  • 12. OBJECT Oriented Middleware (ORB) CORBA The Common Object Request Broker Architecture BY OMG Group PROS • Platform Independent • Language Independent • ORB :- Object request broker • IIOP :- internet inter operable protocol. APPLICATION CALL(function) CLIENT STUB ORB ORB Skeleton Function execute and result IIOP :- internet inter operable protocol. IDL
  • 14. COM/DCOM PROS • MSIDL:- Microsoft IDL • DCE-RCP :-distributed computing Env-R. CLIENT Proxy COM runtime lib in windows NT COM runtime lib in windows NT STUB Function execute and result DCE-RPC Component object module and distributed component Object Module MSIDL
  • 15. Enterprise JAVA Bean JAVA RMI (Remote Method Invocation) PROS • Platform Independent • JAVA RMI . WEB Browser WEB APP RMI registry/ JVM RMI registry/ JVM JDBC DATABASE IDL RMI-IIOP
  • 16. Vulnerabilities in Middleware ISSUES • OVERFLOWS • WEB Application TOP 10 • Architecture flow • Say No to Scanner’s