Introduction to Deserialization Attacks
Introduction
History
Attack Types
Object Injection
Remote Code Execution
Identifying Serialization
White-Box (Source Code Access)
Language
Function
Black-Box (No Source Code)
Format
Language/Protocol
Tools
Identifying Language from Serialized Data
Example: Ruby Detection
Last updated