Exploiting Node.js deserialization bug for Remote Code Execution

Cyber Security | Penetration Test | CTF | Walkthrough | Temple of Doom 2 | DeserializationПодробнее

Cyber Security | Ethical Hacking | Penetration Test | CTF | Walkthrough | MoonrakerПодробнее

Cyber Security | Ethical Hacking | Pentesting Lab | Tryhackme | VulnNet NodeПодробнее

Cyber Security | Ethical Hacking | Pentesting Lab | Hackthebox | NodeBlog | Very DetailedПодробнее

Cyber Security | Ethical Hacking | Pentesting Lab | Vulnhub | Walkthrough | Shuriken NodeПодробнее

Exploiting NodeJS Deserialization in TryhackmeПодробнее

Exploiting Insecure Deserialization: Node-SerializeПодробнее

HTB - Celestial walkthrough (ITA)Подробнее

Shurken | Vulnhub | Çözümü | Walkthrough | Write upПодробнее

Unprotected API : Web to Root - Web application Hacking | Node.js Deserialisation - Praveen SinghПодробнее

HackTheBox Celestial Walkthrough / SolutionПодробнее

Temple of doomПодробнее

Tutorial Hacking Nodejs Serialize Unserialize - RCE remote command executionПодробнее

RuhrSec 2016: "Java deserialization vulnerabilities - The forgotten bug class", Matthias KaiserПодробнее
