Course
In this lab, you will learn how to exploit PHP phar deserialization vulnerabilities to gain code execution. You will explore PHP handlers like <code>file://</code> and <code>phar://</code>, and understand how to leak source code and use it to craft a malicious PHP archive.
Skills covered
Injection
Authentication
Operating System
Network
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.