Forum Discussion
Serial Maze Support Group
- 3 months ago
Sabrina mentioned in another post. "I would recommend having a look at the Browser Developer Tools: Console and JavaScript Execution lab, as there is some overlap in the tasks. We don't have an offensive lab on Python pickles, but you may find Python: Insecure Deserialization useful, including the further reading linked at the end. Good luck!"
In the Insecure Deserialization it mentions "The developers of a GPS fitness tracking application unfortunately implemented the feature to upload jogging routes vulnerable to insecure deserialization attacks, since they decided to use the insecure pickle format. Your task is to remediate this vulnerability using the more secure JSON format."
So maybe this can be of help.
itsdangerous
token > secret_key > 🥒 > answer
I'm stuck...
tried deserialization on both move/submit endpoint.. unable to exploit.
tried rockyou and both endpoint token .. failed..
found one endpoint 2257 .. which is asking for secret.. but don't see any parameter to brute force..
I'm stuck... would appreciate any hints
TIA