Skip to content

Exploiting API to Shell challenge from Pentesterlab serialize badge.

Notifications You must be signed in to change notification settings

j4k0m/API-to-Shell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

API to Shell

This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.

  • A weakness in a signature check due to PHP type confusion.
  • A call to PHP unserialize.

From PentesterLab serialize badge.

About

Exploiting API to Shell challenge from Pentesterlab serialize badge.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published