Harsh Dhamaniya

Articles By This Author

Insecure Deserialization Lab 6 : Exploiting PHP deserialization with a pre-built gadget chain

Access Lab : https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-exploiting-php-deserialization-with-a-pre-built-gadget-chain Understanding the Concept What is PHP Generic Gadget Chains PHP Generic Gadget Chains are sets of exploit payloads crafted for PHP-based web applications vulnerable to insecure deserialization. These gadget chains utilize weaknesses in PHP’s serialization mechanism to manipulate the flow of data within the application, potentially leading to remote code execution […]

Read More

Insecure Deserialization Lab 5 : Exploiting Java deserialization with Apache Commons

Access Lab : https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-exploiting-java-deserialization-with-apache-commons Understanding the Concept the concept of gadget chains plays a pivotal role in understanding and mitigating the risks associated with insecure deserialization vulnerabilities. To delve into this topic comprehensively, let’s break down the key components and implications of gadget chains. Understanding Insecure Deserialization: Deserialization is the process of converting data that […]

Read More

Insecure Deserialization Lab 4 : Arbitrary object injection in PHP

Access Lab : https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-arbitrary-object-injection-in-php Understanding the Concept What are Magic Methods? Magic methods are special methods in object-oriented programming languages that are automatically invoked under specific circumstances without needing to be explicitly called by the programmer. These methods are indicated by double underscores (__) either as a prefix or surrounding the method name. Why are […]

Read More

Insecure Deserialization Lab 3 : Using application functionality to exploit insecure deserialization

Access Lab : https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-using-application-functionality-to-exploit-insecure-deserialization Objective This lab uses a serialization-based session mechanism. A certain feature invokes a dangerous method on data provided in a serialized object. To solve the lab, edit the serialized object in the session cookie and use it to delete the morale.txt file from Carlos’s home directory. You can log in to […]

Read More

Insecure Deserialization Lab 2 : Modifying serialized data types (Privilege Escalation Technique using PHP Data Comparision Concept)

Access Lab : https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-modifying-serialized-data-types Understanding the Concept In PHP, there’s a risky behavior involving the loose comparison operator (==) when dealing with different data types. Let’s break it down: Loose Comparison Oddity: When you compare an integer with a string using ==, PHP tries to turn the string into an integer. So, 5 == “5” […]

Read More

Insecure Deserialization Lab 1 : Modifying serialized objects (Privilege Escalation Technique)

Access Lab : https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-modifying-serialized-objects Objective This lab utilizes a session mechanism based on serialization, which makes it vulnerable to privilege escalation. To complete the lab, modify the serialized object in the session cookie to exploit this vulnerability and obtain administrative privileges. Once you have these privileges, delete the user carlos. To log into your account, […]

Read More

Insecure Deserialization : The Hidden Danger

Serialization and deserialization are fundamental concepts in computer science, particularly in the context of data storage, communication between different systems, and object-oriented programming. Let’s delve deeper into these concepts: Serialization: Serialization is the process of converting an object into a format that can be easily stored or transmitted across a network. The primary goal of […]

Read More

Websocket Security : Exploiting Realtime Communication

Understanding the history of HTTP communications provides crucial context for comprehending the necessity and evolution of WebSockets. Initially, HTTP (Hypertext Transfer Protocol) served as the backbone of communication on the World Wide Web, primarily designed for client-server interactions involving the transfer of static resources like HTML documents. However, as web applications became more dynamic and […]

Read More