Java Serialisation – the gift that keeps on taking (Part 3)

In the previous post we  examine particular Java Serialisation characteristics and design points that had a few unexpected consequences.  In this post we'll explore more around exploiting serialisation datastreams.  How it's possible to ...

Java Serialization. The gift that keeps on taking. Part 1

| | DevZone, Java, Log4j, serialization
Hands up who has heard of Log4Shell?  No? If you’re a Java developer and this term isn’t familiar to you then you might want to google it right now. We’ll wait ...
serialization

Serialization: Protecting Enterprise Critical Applications

Enterprise organizations have built much of their foundations on Oracle’s WebLogic servers. As ubiquitous as they are, it’s no wonder that they are often the target of sophisticated attacks aimed at harvesting ...
Security Boulevard
Understanding ysoserial's CommonsCollections1 exploit

Understanding ysoserial’s CommonsCollections1 exploit

Last year, ysoserial was released by frohoff and gebl. It is a fantastic piece of work. The tool provides options to generate several different types of serialized objects, which when deserialized, can result ...