Java Insecure Deserialization I

Port scan and dirbuster of the web server.

/upload php allows us to upload a file.

In this application you have to read the file while the upload is being processed. This means you need two tabs open. After you click upload you need to then click read in a separate browser tab.

This lab required to brute force the gagets. First step is to extract them from ysoserial.

Then generate the payloads.

The below python script will try to send each payload to the application and then read the file.

Run tcpdump to check for the pingback.

The ping is received and we can confirm that the correct payload is CommonsCollections2.

Create a file named rev.py and start a Python web server.

Setup a netcat listener and observe the reverse shell.

Final python script is below. Note that it has to run the payload 3 times, once to download the rev.py, then chmod +x and then execute.

Last updated