1 Video for ObjectInputStream

PRO
Tier
Medium
Medium
4359 completed
Return to Exercise
image of exercise Exploitation of ObjectInputStream class

This video requires PentesterLab PRO

GO PRO
Spoiler
Exploitation of ObjectInputStream class

In this video, we explore the exploitation of a Java serialization vulnerability using the ObjectInputStream class and the readObject method. We demonstrate how to gain code execution by manipulating serialized objects within a web application.

video duration icon05:32 number of views icon8071