YoVDO

How I Used a JSON Deserialization 0day to Steal Your Money on the Blockchain

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Remote Code Execution Courses

Course Description

Overview

Explore a Black Hat conference talk that delves into exploiting a JSON deserialization vulnerability in Fastjson, a popular open-source JSON parser. Learn how the speakers bypassed security checks and mitigations by leveraging inheritance processes of basic classes to achieve remote code execution. Discover the step-by-step process, from introduction and demo to visualizing the serialized process, autotype support and bypass, magic method derivation, JSONpath, GenTron, and ReadWriteLevelDB. Gain insights into post-penetration techniques and understand the potential impact on blockchain security and financial transactions.

Syllabus

Introduction
Demo
Visualizing the serialized process
Autotype support
Autotype bypass
Magic Method
Derivation
JSONpath
Gen
Tron
ReadWrite
LevelDB
Red File
Read Files
Post Penetration


Taught by

Black Hat

Related Courses

BurpSuite Extensions
YouTube
Web Hacking - Técnicas de Invasão em Ambientes Web [Pentest]
Udemy
JavaScript Security
Infosec via Coursera
CVE Series: Log4J (CVE-2021-44228)
Cybrary
CVE-2021-44228 - Log4j - Minecraft Vulnerable and So Much More
John Hammond via YouTube