From the course: Foundational JavaScript Security
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Insecure deserialization - JavaScript Tutorial
From the course: Foundational JavaScript Security
Insecure deserialization
- [Instructor] Before we talk about insecure deserialization, let's talk about what deserialization is, If you're not familiar with the term. In short, deserialization is the transformation of data coming from a file or the network, typically from a JSON or XML format into an object that your application can read. So when you hear about serialization, well it's the opposite, where the object is serialized into a readable JSON format when transferred through the network. Most frameworks have methods that do this automatically for us. So what is insecure deserialization? It's when hackers exploit on trusted data to render the applications resources useless. Like a denial of service attack or even execute code inside your application. To remedy this, there are several ways and packages that exist. Feel free to use which one you prefer when serializing and deserializing your data. As long as they don't use the JS method,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
(Locked)
Injection threat2m 21s
-
(Locked)
Broken authentication1m 57s
-
(Locked)
Sensitive data1m 5s
-
(Locked)
XML external entities1m 10s
-
(Locked)
Security misconfiguration1m 28s
-
(Locked)
Insecure deserialization1m 17s
-
(Locked)
Components with known vulnerabilities1m 2s
-
(Locked)
Insufficient logging and monitoring1m 37s
-
(Locked)
Challenge: What is the best resource for top threats?25s
-
(Locked)
Solution: What is the best resource for top threats?39s
-
(Locked)
-
-