Exploitation of ObjectInputStream class

image of exercise Exploitation of ObjectInputStream class
Access to videos for this exercise is only available with PentesterLab PRO GOPRO
Spoiler
Exploitation of ObjectInputStream class

In this video, we explore the exploitation of a Java serialization vulnerability using the ObjectInputStream class and the readObject method. We demonstrate how to gain code execution by manipulating serialized objects within a web application.

video duration icon05:32 number of views icon7834