Serialization is currently one of the hot topic in web security. This badge covers the exploitation of serialization vulnerabilities in multiple languages

  • Java
  • Completed by 791 students

XMLDecoder

  • Difficulty:

This exercise covers the exploitation of an application using XMLDecoder

  • Java/Tomcat
  • Completed by 670 students

CVE-2016-0792

  • Difficulty:

This exercise covers the exploitation of an Xstream vulnerability in Jenkins

  • 1 video
  • Java
  • Completed by 660 students

ObjectInputStream

  • Difficulty:

This exercise covers the exploitation of a call to readObject in a Spring application

  • Rails
  • Completed by 547 students

CVE-2013-0156

  • Difficulty:

This exercise covers the exploitation of a code execution in Ruby-on-Rails using XML and YAML.

  • 6 videos
  • PHP/Apache/Mysql
  • Completed by 493 students

API to Shell

  • Difficulty:

This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.