Back to Browse

Exploiting PHP Object Deserialization | How To Be Bug Bounty Hunter

873 views
Aug 6, 2021
3:41

Learn how to exploit object deserialization/injection vulnerability when unserialize function and __wakeup() magic method are used in php. We will be creating our payload to inject it as a user input and later we will find out how it's get processed by unserialize and the way we can further escalate it to Remote Code Execution #bugbounty #php #roadtoethicalhacking

Download

0 formats

No download links available.

Exploiting PHP Object Deserialization | How To Be Bug Bounty Hunter | NatokHD