Module 9 Insecure Deserialization Lab: Description: Requirements: Step 1: Step 2
Module 9 Insecure Deserialization Lab: Description: Requirements: Step 1: Step 2
Module 9 Insecure Deserialization Lab
Description: In this lab, you will identify and exploit an example of insecure deserialization.
Requirements: You will need access to the Cybrary lab environment for this lab.
Question 1: Does the text on the Web page change at all? If yes, what does the new text say?
_______________________________________________________________
Step 12: Next, click back in the URL bar and use the arrow keys on your keyboard to
navigate the URL until you see a value of 12 and the print(“Hi”).
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Step 13: Change the 12 to a 10
Step 14: Change the print(“Hi”) to phpinfo() and press Enter.
Step 15: Next, click back in the URL bar and use the arrow keys on your keyboard to
navigate the URL until you see a value of 10 and the phpinfo().
Step 16: Change the 10 to a 13
Step 17: Change the phpinfo() to system(“id”) and press Enter.
Question 3: Do you see the www-data user account listed? ________________
Note: If we replace the id with another system command, we can execute any command on
the target system with this user account.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2