Insecure Deserialization in Java

I was always curious about how the actual remote code execution occurs during the Insecure Deserialization process. So I thought of giving a try to understand the known harmful gadgets from commons-collections-3.2.2.jar and develop the entire chain from scratch.

Canary Bypass

Linux binary exploitation is a very interesting topic. Thanks to my good friend vampire, he gave me this challenge and helped me to understand a stack canary bypass technique.

Exploiting HP OpenView NNM - B.07.53

In DEFCON #16, there was an interesting session on HP OpenView NNM exploitation “from bug to 0 day” presented by muts. While watching his walk-through, I found that this particular exploit development process was extremely intense and challenging. To better understand the concepts, I decided to take that as an exercise and try to reproduce the same in my local environment.