Serialization RCE
Serialization RCE
Identifying the use of Serialization
White-Box
Function
Language
Black Box
Bytes
Language
Exploiting PHP Deserialization
PHPGGC
Exploiting Python Deserialization
Exploiting __VIEWSTATE parameter without knowing its secrets
Sensitive files: web.config
Tools: https://github.com/pwntester/ysoserial.net https://github.com/blacklanternsecurity/badsecrets
Resources: https://book.hacktricks.xyz/pentesting-web/deserialization/exploiting-__viewstate-parameter
ViewState information can be characterized by the following properties or their combinations:
1) Base64:
2) Base64 + MAC (Message Authentication Code) Enabled:
3) Base64 + Encrypted:
Payload generation commands:
Last updated