返回介绍

Finding Your First Insecure Deserialization!

发布于 2024-10-11 20:34:01 字数 1172 浏览 0 评论 0 收藏 0

Now it’s time to dive in and find your first insecure deserialization vulnerability. Follow the steps we covered to find one:

现在是时候开始深入挖掘并找到您的第一个反序列化漏洞了。按照我们介绍的步骤去找一个吧:

  1. If you can get access to an application’s source code, search for deserialization functions in source code that accept user input.
  2. If you cannot get access to source code, look for large blobs of data passed into an application. These could indicate serialized objects that are encoded.
  3. Alternatively, look for features that might have to deserialize objects supplied by the user, such as database inputs, authentication tokens, and HTML form parameters.
  4. If the serialized object contains information about the identity of the user, try tampering with the serialized object found and see if you can achieve authentication bypass.
  5. See if you can escalate the flaw into a SQL injection or remote code execution. Be extra careful not to cause damage to your target application or server.
  6. Draft your first insecure deserialization report!

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。
列表为空,暂无数据
    我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
    原文