Exploitation of ObjectInputStream class

Return to Exercise
image of exercise Exploitation of ObjectInputStream class

This video requires PentesterLab PRO

GO PRO
Spoiler
Exploitation of ObjectInputStream class

In this video, we explore the exploitation of a Java serialization vulnerability using the ObjectInputStream class and the readObject method. We demonstrate how to gain code execution by manipulating serialized objects within a web application.

video duration icon05:32 number of views icon8071