4 Videos for Pickle Code Execution

PRO
Tier
Medium
Medium
6501 completed
Return to Exercise
image of exercise Pickle: Introduction

This video requires PentesterLab PRO

GO PRO
Pickle: Introduction

In this video, we introduce the "Pickle" challenge from the white badge series, focusing on Python's serialization and deserialization using the Pickle module. We cover how deserialization can lead to code execution and demonstrate a practical example of exploiting this behavior.

video duration icon04:44 number of views icon1848

 

image of exercise Pickle: Exploitation with Python 3

This video requires PentesterLab PRO

GO PRO
Spoiler
Pickle: Exploitation with Python 3

In this video, we explore the "Pickle" challenge from the white badge series using Python 3. We demonstrate how to exploit a web application's "remember me" feature to gain code execution by manipulating Pickle objects.

video duration icon04:33 number of views icon2659

 

image of exercise Pickle: Exploitation of the online challenge with Python 2

This video requires PentesterLab PRO

GO PRO
Spoiler
Pickle: Exploitation of the online challenge with Python 2

In this video, we cover the Python Pickle Code Injection exercise as part of the white badge curriculum. We demonstrate how to exploit a vulnerability using Python 2 by manipulating cookies and leveraging the Pickle module.

video duration icon04:17 number of views icon5454

 

image of exercise Pickle: Exploitation against the ISO

This video requires PentesterLab PRO

GO PRO
Spoiler
Pickle: Exploitation against the ISO

In this video, we explore the exploitation of a Python Pickle Code Injection vulnerability. We demonstrate how to manipulate serialized data to achieve code execution on a server.

video duration icon09:30 number of views icon8485