Course
This exercise covers the research by Luke Jahnke on Ruby deserialization, demonstrating how to gain code execution without relying on external libraries by controlling data in a call to Marshal.load(...). It explores generating the proper gadget to exploit this vulnerability effectively.
Skills covered
Injection
Operating System
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.