“This module will cover the in-depth analysis and exploitation of a deserialization remote code execution vulnerability in the DotNetNuke (DNN) platform through the use of maliciously crafted cookies. The primary focus of the module will be directed at the .Net deserialization process, and more specifically at the XMLSerializer class.”

General knowledge about XML

Follow the course material. Some good readings:

https://www.blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf

Usage of DnSpy

  1. Open a .dll file through “File” > “Open”
  2. Edit any target method by right click on the method (module) and select “Edit Method (C#)” or “Edit Class”. Compile before quit the edit and save the file so the source .dll is permanently changed.
  3. Attach to a running process by “Debug” > “Attach to Process”.