Exploit Java Deserialization | Discovering Insecure Deserialization

preview_player
Показать описание
Hi... It's been a while. Anyways, here's a new video!

This is the second in a three part series where we dissect Java deserialization vulnerabilities. Building off the last video, we discuss how to identify Java deserialization vulnerabilities from a blackbox and a whitebox perspective.

Deserialization Cheat Sheet

Docker Lab - Java Deserialization
Рекомендации по теме
Комментарии
Автор

Music is perfect, not too loud and keeps your mind on the task 🎵 thanks for these videos

Xpressd
Автор

Pronunciation is so clear, material is so clear, I’m just starting to learn how to read the code in searching for bugs, thank you so much, we are waiting for the next part. Much appreciated!

DRBLK
Автор

Good job sir. Can you make a demo how crowdstrike falcon works ? Thanks mate!

SuperChelseaSW
Автор

0:54 Could you please share tips and tricks how did you find the vulnerable page /invoker/JMXInvokerServlet? Did you fuzz it?

I use the docker image but couldn't find this page. Is there any specific requirements needed?

wolfrevokcats