O'Reilly logo

Covert Java™: Techniques for Decompiling, Patching, and Reverse Engineering by Alex Kalinovsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Snooping the Runtime Environment

 

“Logic is a systematic method of coming to the wrong conclusion with confidence.”

 
 --Murphy's Technology Laws

The Value of Understanding the Runtime Environment

Hacking systems and troubleshooting applications often require manipulation of various system parameters. For example, to install a patched version of a class in Chapter 5, “Replacing and Patching Application Classes,” we modified the value of the CLASSPATH variable. In Chapter 7, “Manipulating Java Security,” you saw how to use a system ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required