API to Shell

Bookmarked!

This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.

PRO Hard 2-4 Hrs. 3521 Serialize Badge
Course

This course demonstrates the exploitation of two PHP vulnerabilities: a type confusion issue in a signature check and an unserialize call. By leveraging these vulnerabilities, you will learn to retrieve application source code and exploit the unserialize function for further attacks.

Skills covered
Injection Authentication Authorisation Cryptography Operating System
Topics
API
CWE-502,CWE-310
Included with PRO
Full course content 6 videos Common mistakes

Ready to practice?

Get access to this lab and 600+ hands-on exercises with a PRO subscription.