Serialize Badge

Serialization is currently one of the hot topic in web security. This badge covers the exploitation of serialization vulnerabilities in multiple languages

5

Exercises

844

Completed this badge

5

CPEs

XMLDecoder

This exercise covers the exploitation of an application using XMLDecoder

Difficulty: EASY
  • 1 video
  • Java
  • Completed by 1475 students
  • Takes Less than an hour on average

CVE-2016-0792

This exercise covers the exploitation of an Xstream vulnerability in Jenkins

Difficulty: EASY
  • 1 video
  • Java/Tomcat
  • Completed by 1263 students
  • Takes Less than an hour on average

ObjectInputStream

This exercise covers the exploitation of a call to readObject in a Spring application

Difficulty: MEDIUM
  • 1 video
  • Java
  • Completed by 1196 students
  • Takes Less than an hour on average

CVE-2013-0156

This exercise covers the exploitation of a code execution in Ruby-on-Rails using XML and YAML.

Difficulty: MEDIUM
  • 1 video
  • Rails
  • Completed by 1049 students
  • Takes Less than an hour on average

API to Shell

This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.

Difficulty: HARD
  • 6 videos
  • PHP/Apache/Mysql
  • Completed by 920 students
  • Takes Between 2 and 4 hours on average