Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/NetSPI/JavaSerialKiller

Burp extension to perform Java Deserialization Attacks
https://github.com/NetSPI/JavaSerialKiller

Last synced: about 1 month ago
JSON representation

Burp extension to perform Java Deserialization Attacks

Awesome Lists containing this project

README

        

# Note
**I am not actively updating this extension. I recommend using either https://github.com/federicodotta/Java-Deserialization-Scanner, https://portswigger.net/bappstore/e20cad259d73403bba5ac4e393a8583f, or https://portswigger.net/bappstore/ae1cce0c6d6c47528b4af35faebc3ab3 for exploiting Java Deserialization**

# Java Serial Killer

Burp extension to perform Java Deserialization Attacks using the ysoserial payload generator tool.

Blog https://blog.netspi.com/java-deserialization-attacks-burp/

Chris Frohoff's ysoserial (https://github.com/frohoff/ysoserial)

## Download & Requirements

Download from the Releases tab: https://github.com/NetSPI/JavaSerialKiller/releases

Requirements: Java 8

## Instructions

1. Right-click on a request and select Send to Java Serial Killer
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/SNAG-0007.png)
2. Highlight the area or parameter you want the serialized Java object to replace
3. Select the payload that you want, type in the command, choose to base64 encode or not, and press Serialize

Note: You do not need to re-highlight the serialized Java object if you change the payload or command. It will automatically update the request with the correct serialization in the spot that you highlighted the first time, even if you base64 encode it.

4. From here you can press Go button to send the request or right-click and send it to another tool.

##Examples
###Serialize Request Body
1. Highlight request body
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6174.png)
2. Press the Serialize button
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6175.png)
3. Check the Base64 Encode box and press the Serialize button
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6176.png)

###Serialize Request Body Parameter
1. Highlighting parameter in request body
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6177.png)
2. Press the Serialize button
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6178.png)
3. Check the Base64 Encode box and press the Serialize button
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6179.png)