Coalfire-Research/java-deserialization-exploits

how to use this good tool?

gayhub-blackerie opened this issue · 2 comments

I am a newbie to learn web security.Fortunately,I meet this tool,but it is very difficult to some people like me.Can anyone write a note about how to use it?By the way, how to understand this :
Usage: java -jar ysoserial-[version]-all.jar [payload type] '[command to execute]'
My way:java -jar ysoserial.jar

n00py commented

For these exploits you don't use the ysoserial.jar by itself.

Most of the time you don't need to specify the ysoserial path as it will look in the current directory.

On most of these you just need to supply the IP and port of the target and then the command you want to run.

each of these .py scripts have slightly different syntax so it depends which one you want to run.

Which service are you going after? (Jenkins/weblogic/etc?)

Closing since this seems to be a stale issue