SlideShare a Scribd company logo
Exploitation and Mitigation
for Insecure Deserialization -
A web attack
Sukhpreet Singh
Background
Representation of serialized content
Python native format Generic format
Types of attack
1) Endless possibilities
a) Launching a N/W DoS.
b) Reverse Shell
c) Remote Code execution
d) Many more...
Example
- A job search website that
- Takes their user’s skills and
- email ID
- And searches job for them
- Assuptions: a) User knows the filename
to which the web app writes to.
- Vulnerability: Blindly trusting user
input.
Naive Situation
Code on the receiver’s end
Demo
Attack Demo
Attack Diagram
Impact on the organization
1) Endless possibilities
a) Compromise of
i) Confidentiality
ii) Integrity
iii) Availability
b) The organization itself can be perceived as an attacker.
Mitigation Techniques
Never deserialize untrusted data.
Untrusted data is:
Data that crosses boundaries: Client to server or vice versa, between different servers.
Data that have been modified: using digital signatures and hash checks.
Implementing: SHA-256 & HMAC
Changes made on the sender side
Implementing: SHA256 & HMAC
Changes made on the receiver side
Does HMAC mitigate the attack?
Thank you
Questions???

More Related Content

PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PPTX
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
PPTX
Owasp Top 10 A1: Injection
PPTX
Vulnerabilities in modern web applications
PDF
OAuth 2.0 Security Reinforced
PPTX
Android Application Penetration Testing - Mohammed Adam
PDF
Cross site scripting
OWASP Top 10 2021 Presentation (Jul 2022)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Owasp Top 10 A1: Injection
Vulnerabilities in modern web applications
OAuth 2.0 Security Reinforced
Android Application Penetration Testing - Mohammed Adam
Cross site scripting

What's hot (20)

PPTX
Directory Traversal & File Inclusion Attacks
PDF
Sql injection with sqlmap
PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
PDF
Ekoparty 2017 - The Bug Hunter's Methodology
PDF
Lie to Me: Bypassing Modern Web Application Firewalls
PDF
Building Advanced XSS Vectors
PPT
SQL Injection
PPTX
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
PPTX
Cross site scripting
PDF
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
PPT
A Brief Introduction in SQL Injection
PDF
OWASP Top 10 Web Application Vulnerabilities
PPTX
Cross Site Scripting(XSS)
PPTX
A8 cross site request forgery (csrf) it 6873 presentation
PDF
Neat tricks to bypass CSRF-protection
PDF
Penetration testing web application web application (in) security
PPTX
Sql injection
PDF
OWASP API Security Top 10 - API World
PPTX
Secure Coding 101 - OWASP University of Ottawa Workshop
PPTX
STORED XSS IN DVWA
Directory Traversal & File Inclusion Attacks
Sql injection with sqlmap
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Ekoparty 2017 - The Bug Hunter's Methodology
Lie to Me: Bypassing Modern Web Application Firewalls
Building Advanced XSS Vectors
SQL Injection
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Cross site scripting
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
A Brief Introduction in SQL Injection
OWASP Top 10 Web Application Vulnerabilities
Cross Site Scripting(XSS)
A8 cross site request forgery (csrf) it 6873 presentation
Neat tricks to bypass CSRF-protection
Penetration testing web application web application (in) security
Sql injection
OWASP API Security Top 10 - API World
Secure Coding 101 - OWASP University of Ottawa Workshop
STORED XSS IN DVWA
Ad

Similar to Attack and Mitigation for Insecure Deserialization (20)

PDF
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
PPTX
Common Cyberthreats and How to Prevent Them (2019)
PPTX
PyConPL 2017 - with python: security
PDF
Of Search Lights and Blind Spots: Machine Learning in Cybersecurity
PDF
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling
PDF
Presentation- Introduction to Cybersecurity.pdf
PPTX
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
PDF
[Keynote @ RAID'24] How to solve cybersecurity once and for all
PDF
[GDSC]CyberSec.pdf
PDF
How Eggxactly Insecure Deserialization Exploit works(1).pdf
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
PDF
OWASP TOP 10 by Team xbios
PPTX
Chapter 1
PDF
introduction to security coursera slides.pdf
PPTX
Unique way-to-hack-into-a-python-web-service
PPTX
IP SPOOFING &-.pptx
PPT
1.Security Overview And Patching
PDF
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
PDF
Breakfast cereal for advanced beginners
PPTX
Operations Security
Rodrigo Branco - How Offensive Security is Defining the Way We Compute // Key...
Common Cyberthreats and How to Prevent Them (2019)
PyConPL 2017 - with python: security
Of Search Lights and Blind Spots: Machine Learning in Cybersecurity
Let’s Check Let’s Encrypt: A Tool for Code-Driven Threat Modeling
Presentation- Introduction to Cybersecurity.pdf
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
[Keynote @ RAID'24] How to solve cybersecurity once and for all
[GDSC]CyberSec.pdf
How Eggxactly Insecure Deserialization Exploit works(1).pdf
Threat Modeling - Locking the Door to Vulnerabilities
OWASP TOP 10 by Team xbios
Chapter 1
introduction to security coursera slides.pdf
Unique way-to-hack-into-a-python-web-service
IP SPOOFING &-.pptx
1.Security Overview And Patching
Unsafe Deserialization Attacks In Java and A New Approach To Protect The JVM ...
Breakfast cereal for advanced beginners
Operations Security
Ad

Recently uploaded (20)

PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
top salesforce developer skills in 2025.pdf
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
AI in Product Development-omnex systems
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
System and Network Administraation Chapter 3
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
top salesforce developer skills in 2025.pdf
Softaken Excel to vCard Converter Software.pdf
Wondershare Filmora 15 Crack With Activation Key [2025
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
How to Choose the Right IT Partner for Your Business in Malaysia
How to Migrate SBCGlobal Email to Yahoo Easily
Reimagine Home Health with the Power of Agentic AI​
PTS Company Brochure 2025 (1).pdf.......
wealthsignaloriginal-com-DS-text-... (1).pdf
Digital Strategies for Manufacturing Companies
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
AI in Product Development-omnex systems
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
System and Network Administraation Chapter 3
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Odoo Companies in India – Driving Business Transformation.pdf
How Creative Agencies Leverage Project Management Software.pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf

Attack and Mitigation for Insecure Deserialization