![Scanning an enterprise organisation for the critical Java deserialization vulnerability | Weblog | Sijmen Ruwhof Scanning an enterprise organisation for the critical Java deserialization vulnerability | Weblog | Sijmen Ruwhof](https://sijmen.ruwhof.net/weblog/wp-content/uploads/2015/11/SuperSerial-627x260.png)
Scanning an enterprise organisation for the critical Java deserialization vulnerability | Weblog | Sijmen Ruwhof
![Burp Suite on Twitter: "@damian_89_ The extension settings are saved in a local config file and should persist on a restart. How many extensions do you have loaded?" / Twitter Burp Suite on Twitter: "@damian_89_ The extension settings are saved in a local config file and should persist on a restart. How many extensions do you have loaded?" / Twitter](https://pbs.twimg.com/media/EO-hBtvWsAEYiSg.png)
Burp Suite on Twitter: "@damian_89_ The extension settings are saved in a local config file and should persist on a restart. How many extensions do you have loaded?" / Twitter
![Java-Deserialization-Scanner – BurpSuite JAVA deserialization vulnerability scanning plug-in – Penetration Testing | Julio Della Flora Java-Deserialization-Scanner – BurpSuite JAVA deserialization vulnerability scanning plug-in – Penetration Testing | Julio Della Flora](https://i0.wp.com/securityonline.info/wp-content/uploads/2017/07/Capture-10.png?resize=350%2C200&ssl=1)
Java-Deserialization-Scanner – BurpSuite JAVA deserialization vulnerability scanning plug-in – Penetration Testing | Julio Della Flora
![Reliable discovery and exploitation of Java deserialization vulnerabilities | @Mediaservice.net Technical Blog Reliable discovery and exploitation of Java deserialization vulnerabilities | @Mediaservice.net Technical Blog](https://techblog.mediaservice.net/wp-content/uploads/2017/05/2.png)
Reliable discovery and exploitation of Java deserialization vulnerabilities | @Mediaservice.net Technical Blog
GitHub - PortSwigger/java-deserialization-scanner: All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities
![Extracting data using Insecure Direct Object Reference (IDOR) flaws | Hands-On Application Penetration Testing with Burp Suite Extracting data using Insecure Direct Object Reference (IDOR) flaws | Hands-On Application Penetration Testing with Burp Suite](https://static.packt-cdn.com/products/9781788994064/graphics/1f2910f1-cb6a-4659-b3e8-a11ecd9b72b7.png)
Extracting data using Insecure Direct Object Reference (IDOR) flaws | Hands-On Application Penetration Testing with Burp Suite
![Java Deserialization — From Discovery to Reverse Shell on Limited Environments | by Francesco Soncina (phra) | ABN AMRO — Red Team | Medium Java Deserialization — From Discovery to Reverse Shell on Limited Environments | by Francesco Soncina (phra) | ABN AMRO — Red Team | Medium](https://miro.medium.com/max/1400/1*yb-AaOf10vGN34f_uvDd-Q.png)
Java Deserialization — From Discovery to Reverse Shell on Limited Environments | by Francesco Soncina (phra) | ABN AMRO — Red Team | Medium
![Understanding & Identifying Insecure Deserialization Vulnerabilities | by goswamiijaya | InfoSec Write-ups Understanding & Identifying Insecure Deserialization Vulnerabilities | by goswamiijaya | InfoSec Write-ups](https://miro.medium.com/max/1400/1*p-Dc62T113f60ZHIHLPs_w.png)