British hacker Stephen Tomkinson found out two attacks that can be done with Blu-Ray.
His first exploit is based on a poor Java application in the known application CyberLink's PowerDVD. PowerDVD plays DVDs on computers and creates menu using Java, but the way it uses Oracle code allows the checks to be bypassed security που πραγματοποιούν τα Windows.
The result, as he says NCC Group, is that it is possible for executable Blu-Ray discs to automatically run at cmmovement των Windows, ακόμα και όταν οι settings they forbid it.
The second attack borrows, in part, from his discovery hacker Malcom Stagg, (the Blu Ray rooting process) that exploits code debugging when it starts to launch an external USB. With a new Java Xlet script, hackers can replicate the TCP stream to the net inf daemon, which provides a exploit from a Blu ray disc.
Attackers should first determine the model of the DVD player used by the target to create a security exception specifically for this.
Tomkinson urges interested users to avoid playing Blu-Ray discs from unreliable sources, and to prevent discs from playing Auto-play and accessing the internet.