![Remote Method Invocation(RMI). Basically RMI is a method for accessing… | by Dulith Senanayake | Medium Remote Method Invocation(RMI). Basically RMI is a method for accessing… | by Dulith Senanayake | Medium](https://miro.medium.com/v2/resize:fit:1400/1*ZLy7j4Oh0l_4DFn73GaeSA.png)
Remote Method Invocation(RMI). Basically RMI is a method for accessing… | by Dulith Senanayake | Medium
![Java Deserialization Exploits: Registry Whitelist Bypass - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. Java Deserialization Exploits: Registry Whitelist Bypass - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.](https://nsfocusglobal.com/wp-content/uploads/2020/06/0525-2.jpg)
Java Deserialization Exploits: Registry Whitelist Bypass - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
![Java RMI for pentesters: structure, recon and communication (non-JMX Registries). | by AFINE | ITNEXT Java RMI for pentesters: structure, recon and communication (non-JMX Registries). | by AFINE | ITNEXT](https://www.assignmentpoint.com/wp-content/uploads/2020/07/Remote-Method-Invocation.jpg)