PentesterLab
  • Login
  • Register
  • Introduction 00 (next)
    • Course
    • Videos
    • Scoring
    • Introduction Badge
  • Introduction Badge (next)
  • Badges
    • Introduction Badge
    • Unix Badge
    • Essential Badge
    • PCAP badge
    • White Badge
    • Serialize Badge
    • Yellow Badge
    • Blue Badge
    • Green Badge
    • Orange Badge
    • Intercept Badge
    • Authentication / Authorization Badge
    • Android Badge
    • Capture-The-Flag Badge
    • Brown Badge
    • Recon Badge
    • API Badge
    • Code Review Badge
    • Java Serialize Badge
  • Login
  • Register

Serialize Badge

1958 Completed
5 Exercises
Easy image for XMLDecoder

XMLDecoder

  • This exercise covers the exploitation of an application using XMLDecoder
  • 1 video
  • Completed by 3246 students
  • Takes Less than an hour on average
  • Java
Easy image for CVE-2016-0792

CVE-2016-0792

  • This exercise covers the exploitation of an Xstream vulnerability in Jenkins
  • 1 video
  • Completed by 2887 students
  • Takes Less than an hour on average
  • Java/Tomcat
Medium image for ObjectInputStream

ObjectInputStream

  • This exercise covers the exploitation of a call to readObject in a Spring application
  • 1 video
  • Completed by 2659 students
  • Takes Less than an hour on average
  • Java
Medium image for CVE-2013-0156: Rails Object Injection

CVE-2013-0156: Rails Object Injection

  • This exercise covers the exploitation of a code execution in Ruby-on-Rails using XML and YAML.
  • 1 video
  • Completed by 2438 students
  • Takes Less than an hour on average
  • Rails
Hard image for API to Shell

API to Shell

  • This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.
  • 6 videos
  • Completed by 2096 students
  • Takes Between 2 and 4 hours on average
  • PHP/Apache/Mysql
  • Support
  • Privacy
  • Terms of Service

© 2020 - PentesterLab