Insecure Deserialization Attack — TryHackMe Walkthrough
Автор: In Phu Sec Lab
Загружено: 2025-08-22
Просмотров: 485
TryHackMe's Web App PenTest -- Insecure Deserialization: https://tryhackme.com/room/insecurede...
In this episode of inphuseclab, we continue our series on TryHackMe's web application testing, focusing on insecure serialization. We'll cover the basics of serialization in web applications, common vulnerabilities, and real-world examples like the Log4J and Jenkins Java de-serialization flaws. Learn how to identify, exploit, and mitigate these vulnerabilities in different programming languages, including PHP, Python, and Java. We also explore automated tools like PHPGGC and Ysoserial for efficient testing. This video aims to enhance your web application security skills and help you understand the complexities of insecure serialization.
00:00 Introduction
01:55 Some Basic Concepts
06:58 Serialization Formats
15:45 Identification
25:27 Exploitation - Object Injection
33:31 Automation Script
52:23 Mitigation
54:30 Conclusion
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: