Course
This course demonstrates the exploitation of two PHP vulnerabilities: a type confusion issue in a signature check and an unserialize call. By leveraging these vulnerabilities, you will learn to retrieve application source code and exploit the unserialize function for further attacks.
Skills covered
Injection
Authentication
Authorisation
Cryptography
Operating System
Topics
API
CWE-502,CWE-310
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.