Insecure Deserialisation tryhackme | what is Insecure Deserialisation | tryhackme owasp top 10

Опубликовано: 13 Август 2020
на канале: Hackers Adda
131
2

Telegram channel -




Insecure Deserialization tryhackme | what is insecure deserialization | tryhackme owasp top 10



This definition is still quite broad to say the least. Simply, insecure deserialization is replacing data processed by an application with malicious code; allowing anything from DoS (Denial of Service) to RCE (Remote Code Execution) that the attacker can use to gain a foothold in a pentesting scenario.

Specifically, this malicious code leverages the legitimate serialization and deserialization process used by web applications. We'll be explaining this process and why it is so commonplace in modern web applications.


OWASP rank this vulnerability as 8 out of 10 because of the following reasons:


- Low exploitability. This vulnerability is often a case-by-case basis - there is no reliable tool/framework for it. Because of its nature, attackers need to have a good understanding of the inner-workings of the ToE.

- The exploit is only as dangerous as the attacker's skill permits, more so, the value of the data that is exposed. For example, someone who can only cause a DoS will make the application unavailable. The business impact of this will vary on the infrastructure - some organisations will recover just fine, others, however, will not.


.:. What's Vulnerable? .:.

At summary, ultimately, any application that stores or fetches data where there are no validations or integrity checks in place for the data queried or retained. A few examples of applications of this nature are:

- E-Commerce Sites

- Forums

- API's

- Application Runtimes (Tomcat, Jenkins, Jboss, etc)


Who developed the Tomcat application?


What type of attack that crashes services can be performed with insecure deserialization?


A prominent element of object-oriented programming (OOP), objects are made up of two things:
- State
- Behaviour

Simply, objects allow you to create similar lines of code without having to do the leg-work of write all lines of code.

For example, a lamp would be a good object. Lamps can have different types of bulbs, this would be their state, as well as being either on/off - their behaviour!

Rather than having to accommodate every type of bulb and whether or not that specific lamp is on or off, you can use methods to simply alter the state and behaviour of the lamp.

.:.


Select the correct term of the following statement:


if a dog was sleeping, would this be:

A) A State

B) A Behaviour



.:. De(Serialization) .:.

Learning is best done through analogies

A Tourist approaches you in the street asking for directions. They're looking for a local landmark and got lost. Unfortunately, English isn't their strong point and nor do you speak their dialect either. What do you do? You draw a map of the route to the landmark because pictures cross language barriers, they were able to find the landmark. Nice! You've just serialised some information, where the tourist then deserialised it to find the landmark.


.:. Continued... .:.

Serialisation is the process of converting objects used in programming into simpler, compatible formatting for transmitting between systems or networks for further processing or storage.

Alternatively, deserialisation is the reverse of this; converting serialised information into their complex form - an object that the application will understand.


.:. What does this mean? .:.

Say you have a password of "password123" from a program that needs to be stored in a database on another system. To travel across a network this string/output needs to be converted to binary. Of course, the password needs to be stored as "password123" and not its binary notation. Once this reaches the database, it is converted or deserialised back into "password123" so it can be stored.

The process is best explained through diagrams:



.:. How can we leverage this? .:.

Simply, insecure deserialization occurs when data from an untrusted party (I.e. a hacker) gets executed because there is no filtering or input validation; the system assumes that the data is trustworthy and will execute it no holds barred.

What is the name of the base-2 formatting that data is sent across a network as?


Смотрите видео Insecure Deserialisation tryhackme | what is Insecure Deserialisation | tryhackme owasp top 10 онлайн без регистрации, длительностью 15 минут 26 секунд в хорошем hd качестве. Это видео добавил пользователь Hackers Adda 13 Август 2020, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 13 раз и оно понравилось людям.