
This tab uses the ysoserial tool to generate exploitation vectors and includes the generated payload in a HTTP request. The “Exploiting” tab offers a comfortable interface to exploit deserialization vulnerabilities. ExploiterĪfter that a Java deserialization vulnerability has been found, it is possible to actively exploit the issue with the Exploiting dedicated tab. The CPU detection method is not included by default in the active scan checks, because it must be used with caution: sending a huge number of “light” SerialDOS payloads may still cause problems on old or highly-loaded systems. The CPU detection method is based on Wouter Coekaerts’ SerialDOS work ( ) and it is able to detect deserialization issues without the presence of any vulnerable library, using an object that employs many CPU cycles for the deserialization task and checking the time of the response.
BURP SUITE SCAN MANUAL
The manual tester offers an extra detection method: CPU detection. The results of the manual tester can be inserted between Burp Suite scanner results.

The plugin offer a dedicated tab to launch the detection with the sleep and DNS payloads on custom insertion points, in order to check the Java deserialization vulnerabilities in particular situations in which strange entry points do not allow the detection with the scanner. Every application employ a different vulnerable Java library. In the test folder there are some simple Java server applications that can be used to test the plugin.


Java Deserialization Scanner uses custom payloads generated with a modified version of “ysoserial”, tool created by frohoff and gebl, to detect Java deserialization vulnerabilities. Exploiter, that allow to actively exploit Java deserialization vulnerabilies, using frohoff ysoserial ( ) Integration with Burp Suite active and passive scanner.Manual tester, for the detection of Java deserialization vulnerabilities on custom insertion points.Integration with Burp Suite active and passive scanner.The plugin is made up of three different components: It was written by Federico Dotta, a Security Advisor at. Java Deserialization Scanner is a Burp Suite plugin aimed at detect and exploit Java deserialization vulnerabilities.
