Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Second Breakfast - Implicit and Mutation-Based Serialization Vulnerabilities in .NET

Black Hat via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course covers novel attacks against .NET serialization, including serialization exploits of platforms not using well-known .NET serializers, "mutation" attacks exploiting deserialization, and techniques for bypassing serialization binders. The learning outcomes include understanding how to identify and exploit serialization vulnerabilities in .NET applications. The course teaches skills such as identifying vulnerable serialization implementations and exploiting deserialization flaws. The teaching method involves demonstrating remote code execution vulnerabilities in various databases and libraries. The intended audience for this course includes cybersecurity professionals, software developers, and anyone interested in understanding and mitigating serialization vulnerabilities in .NET applications.

Syllabus

Second Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NET

Taught by

Black Hat

Reviews

Start your review of Second Breakfast - Implicit and Mutation-Based Serialization Vulnerabilities in .NET

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.