Back to Browse

Insecure Deserialization: Lab #6 - Exploiting PHP deserialization with a pre-built gadget chain

8.9K views
Premiered Jul 7, 2022
10:26

#portswigger #websecurity #Insecure #deserialization #labs #solution Walkthrough videos regarding the solutions of the lab "Insecure Deserialization:Lab #6 - Exploiting PHP deserialization with a pre-built gadget chain" of "Insecure Deserialization" section of Web Security Academy made by PortSwigger. Link: https://portswigger.net/web-security/deserialization/exploiting In particular, intercepting the request and hacking the cookie session with a proxy, in this case Burp Suite Professional or Burp Suite Community Edition, you will be able to access the admin panel and more. Actually, I'm doing the Web Security Academy made by PortSwigger. In these type of videos, I will focus on some labs. This is one of various type of this kind of videos. Enjoy, and please leave a like and subscribe. About Me: - Bachelor's Degree in Computer Engineering at Università Degli Studi Roma Tre - Burp Suite Certified Practitioner (BSCP) - eLearnSecurity Web Application Application Tester (eWPT) - eLearnSecurity Web Application Application Tester eXtreme (eWPTx) - Red Hat Certified System Administrator (RHCSA) Social networks: https://www.linkedin.com/in/emanuele-picariello-520231199/ https://twitter.com/EmanuelePicari5 If you liked content, subscribed to my channel: https://www.youtube.com/channel/UCx0vGbOo3fdwTK0YqcrVQVw Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Download

0 formats

No download links available.

Insecure Deserialization: Lab #6 - Exploiting PHP deserialization with a pre-built gadget chain | NatokHD