Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/NetSPI/JavaSerialKiller
Burp extension to perform Java Deserialization Attacks
https://github.com/NetSPI/JavaSerialKiller
Last synced: about 1 month ago
JSON representation
Burp extension to perform Java Deserialization Attacks
- Host: GitHub
- URL: https://github.com/NetSPI/JavaSerialKiller
- Owner: NetSPI
- License: mit
- Created: 2016-03-06T07:14:43.000Z (almost 9 years ago)
- Default Branch: master
- Last Pushed: 2024-02-02T20:35:42.000Z (10 months ago)
- Last Synced: 2024-08-02T00:23:03.992Z (4 months ago)
- Language: Java
- Homepage:
- Size: 69.3 KB
- Stars: 209
- Watchers: 21
- Forks: 97
- Open Issues: 7
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-burp-extensions - Java Serial Killer - Burp extension to perform Java Deserialization Attacks. (Vulnerability Specific Extensions / Deserialization)
- awesome-hacking-lists - NetSPI/JavaSerialKiller - Burp extension to perform Java Deserialization Attacks (Java)
README
# Note
**I am not actively updating this extension. I recommend using either https://github.com/federicodotta/Java-Deserialization-Scanner, https://portswigger.net/bappstore/e20cad259d73403bba5ac4e393a8583f, or https://portswigger.net/bappstore/ae1cce0c6d6c47528b4af35faebc3ab3 for exploiting Java Deserialization**# Java Serial Killer
Burp extension to perform Java Deserialization Attacks using the ysoserial payload generator tool.
Blog https://blog.netspi.com/java-deserialization-attacks-burp/
Chris Frohoff's ysoserial (https://github.com/frohoff/ysoserial)
## Download & Requirements
Download from the Releases tab: https://github.com/NetSPI/JavaSerialKiller/releases
Requirements: Java 8
## Instructions
1. Right-click on a request and select Send to Java Serial Killer
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/SNAG-0007.png)
2. Highlight the area or parameter you want the serialized Java object to replace
3. Select the payload that you want, type in the command, choose to base64 encode or not, and press Serialize
Note: You do not need to re-highlight the serialized Java object if you change the payload or command. It will automatically update the request with the correct serialization in the spot that you highlighted the first time, even if you base64 encode it.4. From here you can press Go button to send the request or right-click and send it to another tool.
##Examples
###Serialize Request Body
1. Highlight request body
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6174.png)
2. Press the Serialize button
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6175.png)
3. Check the Base64 Encode box and press the Serialize button
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6176.png)###Serialize Request Body Parameter
1. Highlighting parameter in request body
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6177.png)
2. Press the Serialize button
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6178.png)
3. Check the Base64 Encode box and press the Serialize button
![alt tag](https://blog.netspi.com/wp-content/uploads/2016/03/java-deserialization-attacks-with-burp-6179.png)