Back to Browse

Exploiting PHP deserialization with a pre-built gadget chain - Lab#06

495 views
Apr 7, 2025
17:34

In this video, I walkthrough exploiting PHP deserialization using a pre-built gadget chain in a web application that relies on a signed session cookie. Although source code access is not available, the lab uses a common PHP framework, making it possible to identify a suitable gadget chain and generate a remote code execution (RCE) payload. Using tools like PHPGGC, I craft a malicious serialized object and sign it to forge a valid session cookie. Finally, I use this signed payload to delete the morale.txt file from Carlos's home directory, completing the lab. 🔹 Lab Type: PHP Insecure Deserialization 🔹 Vulnerability: Signed cookie with deserialization flaw 🔹 Attack Strategy: Identify framework → Generate gadget chain RCE payload → Sign and inject cookie 🔹 Target Action: Delete morale.txt in Carlos’s home directory 📌 Don’t forget to like and subscribe for more advanced web security labs, deserialization attacks, and bug bounty content! 🐘💣 #PHPDeserialization #InsecureDeserialization #PHPGGC #WebSecurity #BugBounty #PortSwigger #EthicalHacking #CyberSecurity #CTF #ExploitDevelopment

Download

0 formats

No download links available.

Exploiting PHP deserialization with a pre-built gadget chain - Lab#06 | NatokHD