4 Videos for Pickle Code Execution

PRO
Tier
difficulty_medium_icon
Medium
clock icon
< 1 Hr.
number of users completed icon
6372
badge icon
White Badge
image of exercise Pickle: Introduction
play btn
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Pickle: Introduction

In this video, we introduce the "Pickle" challenge from the white badge series, focusing on Python's serialization and deserialization using the Pickle module. We cover how deserialization can lead to code execution and demonstrate a practical example of exploiting this behavior.

video duration icon04:44 number of views icon1723

 

image of exercise Pickle: Exploitation with Python 3
play btn
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
Pickle: Exploitation with Python 3

In this video, we explore the "Pickle" challenge from the white badge series using Python 3. We demonstrate how to exploit a web application's "remember me" feature to gain code execution by manipulating Pickle objects.

video duration icon04:33 number of views icon2415

 

image of exercise Pickle: Exploitation of the online challenge with Python 2
play btn
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
Pickle: Exploitation of the online challenge with Python 2

In this video, we cover the Python Pickle Code Injection exercise as part of the white badge curriculum. We demonstrate how to exploit a vulnerability using Python 2 by manipulating cookies and leveraging the Pickle module.

video duration icon04:17 number of views icon5379

 

image of exercise Pickle: Exploitation against the ISO
play btn
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
Pickle: Exploitation against the ISO

In this video, we explore the exploitation of a Python Pickle Code Injection vulnerability. We demonstrate how to manipulate serialized data to achieve code execution on a server.

video duration icon09:30 number of views icon8417