java的hash漏洞_HashMap漏洞 | 学步园

== Java ==

Java offers the HashMap and Hashtable classes, which use the

String.hashCode() hash function. It is very similar to DJBX33A (instead of 33, it uses the

multiplication constant 31 and instead of the start value 5381 it uses 0). Thus it is also

vulnerable to an equivalent substring attack. When hashing a string, Java also caches the

hash value in the hash attribute, but only if the result is different from zero.

Thus, the target value zero is particularly interesting for an attacker as it prevents caching

and forces re-hashing.

Different web application parse the POST data differently, but the ones tested (Tomcat,

Geronima, Jetty, Glassfish) all put the POST form data into either a Hashtable or HashMap

object. The maximal POST sizes also differ from server to server, with 2 MB being the most

common.

A Tomcat 6.0.32 server parses a 2 MB string of colliding keys in about

44 minutes of i7 CPU time, so an attacker with about 6 kbit/s can keep one i7 core constantly

busy. If the attacker has a Gigabit connection, he can keep about 100.000 i7 cores busy.

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值