O'Reilly logo

Kali Linux Social Engineering by Rahul Singh Patel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Java Applet Attack

Before we start with the topic of Java Applet Attack, let's first understand what an applet is and how it works.

An applet can be described as a Java program that runs on a web browser. Basically, the concept of a Java applet comes from the concept of embedding within an HTML page.

To view an applet, the Java Runtime Environment (JRE) is required. The JVM can be either a plugin of the web browser or a separate runtime environment.

Java Applet Attack is the most famous and the most successful attack method to compromise a system. It was developed by Thomas Werth, one of the SET developers.

Java Applet Attack works by infecting the JRE. It is the responsibility of the JRE to execute the applet. Java Applet Attack works on Windows, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required