JavaSnoop

Description

JavaSnoop is an Aspect Security tool that allows security testers to easily test the security of Java applications. JavaSnoop is an example of how Aspect is leading the industry in providing Verification Services, and not just for your web applications

Usage

Syntax

sudo javasnoop

Example

cyborg@cyborg:~$ sudo javasnoop 

javasnoop3 JavaSnoop
  NOW,YOU HAVE TO ATTACH A PROCESS, OF WHICH YOU WANT TO CAPTURE PROCESSES.


jsnoop2 JavaSnoop 


java.net.UnknownHostException: www.cookiecadger.com
    at java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:178)
    at java.net.SocksSocketImpl.connect(SocksSocketImpl.java:392)
    at java.net.Socket.connect(Socket.java:579)
    at sun.security.ssl.SSLSocketImpl.connect(SSLSocketImpl.java:618)
    at sun.security.ssl.BaseSSLSocketImpl.connect(BaseSSLSocketImpl.java:160)
    at sun.net.NetworkClient.doConnect(NetworkClient.java:180)
    at sun.net.www.http.HttpClient.openServer(HttpClient.java:432)
    at sun.net.www.http.HttpClient.openServer(HttpClient.java:527)
    at sun.net.www.protocol.https.HttpsClient.<init>(HttpsClient.java:275)
    at sun.net.www.protocol.https.HttpsClient.New(HttpsClient.java:371)
    at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.getNewHttpClient(AbstractDelegateHttpsURLConnection.java:191)
    at sun.net.www.protocol.http.HttpURLConnection.plainConnect(HttpURLConnection.java:932)
    at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:177)
    at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1300)
    at sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:254)
    at com.cookiecadger.CaptureHandler.loadPlugins(CaptureHandler.java:651)
    at com.cookiecadger.CaptureHandler.<init>(CaptureHandler.java:39)
    at com.cookiecadger.CookieCadgerFrame.<init>(CookieCadgerFrame.java:630)
    at com.cookiecadger.Program$2.run(Program.java:111)
    at java.awt.event.InvocationEvent.dispatch(InvocationEvent.java:312)
    at java.awt.EventQueue.dispatchEventImpl(EventQueue.java:733)
    at java.awt.EventQueue.access$200(EventQueue.java:103)
    at java.awt.EventQueue$3.run(EventQueue.java:694)
    at java.awt.EventQueue$3.run(EventQueue.java:692)
    at java.security.AccessController.doPrivileged(Native Method)
    at java.security.ProtectionDomain$1.doIntersectionPrivilege(ProtectionDomain.java:76)
    at java.awt.EventQueue.dispatchEvent(EventQueue.java:703)
    at java.awt.EventDispatchThread.pumpOneEventForFilters(EventDispatchThread.java:242)
    at java.awt.EventDispatchThread.pumpEventsForFilter(EventDispatchThread.java:161)
    at java.awt.EventDispatchThread.pumpEventsForHierarchy(EventDispatchThread.java:150)
    at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:146)
    at java.awt.EventDispatchThread.pumpEvents(EventDispatchThread.java:138)
    at java.awt.EventDispatchThread.run(EventDispatchThread.java:91)
tshark located at /usr/bin/tshark
Querying tshark for capture devices; tshark output follows:
tshark: Lua: Error during loading:
 [string "/usr/share/wireshark/init.lua"]:46: dofile has been disabled due to running Wireshark as superuser. See http://wiki.wireshark.org/CaptureSetup/CapturePrivileges for help in running Wireshark as an unprivileged user.
1. eth0
2. teredo
3. bluetooth0
4. nflog
5. nfqueue
6. any
7. lo (Loopback)
Capture device search completed with 7 devices found.


Cookie Cadger (v1.08, https://cookiecadger.com)
Created by Matthew Sullivan - mattslifebytes.com
This software is freely distributed under the terms of the FreeBSD license.

Opening 'eth0' for traffic capture.
eth0: ============================================================================
eth0: Start of diagnostic information for interface 'eth0'
eth0: ============================================================================
eth0: ============================================================================
eth0: Potential error detected! Capture stopped / died in 13 seconds.
eth0: All messages from the 'tshark' program have been printed above to assist you in solving any errors.
eth0: ============================================================================
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?