Finding & Exploiting Java Deserialization Automatically | Burp Plugin

preview_player
Показать описание
Take a look at how you can find java deserilization vulnerabilities without using ysoserial tool manually.
Ask your question on Discord server, link below.

My microphone was disconnected & I thought it was recording - that is why audio is a bit rough.

Join the discord server for frequent giveaways and resources.
Рекомендации по теме
Комментарии
Автор

Bro your terminal will be having different shortcut key, Terminal copy key and normal copy key. That's why it performing terminal paste instead of normal paste.
In your terminal settings try to check your preference of shortcut keys.
Good video 👍

Mersal-tqlm
Автор

Hi, can you kindly test again the Java Deserialization Scanner? I have replied everything but the sleep payload doesn't work, either nslookup of a my domain with CommonsCollection4, it work only that GadgetChains with the standard payload to remove the "/home/carlos/morales.txt", maybe they have pached this, can you test again please? Thanks

marcozufferli