You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To facilitate easier studying of these types of vulnerabilities the tool scaffolding should be able to instrument itself to generate ASCII diagrams of payload object-graphs (similar to this) and deserialization code execution call-trees (similar to this) to understand the mechanics of each gadget chain better. Simply providing a list of gadget classes could be useful, and a more sophisticated implementation could embed and/or link to code/methods executed during deserialization.
Optionally allow such documentation to be printed to the console as verbose-mode help text when using the CLI interface.
PrintUtil from #16 is probably a good start for object graph inspection
frohoff
changed the title
automated generation of object-graph and call-tree documentation
Automated generation of object-graph and call-tree documentation
Mar 4, 2016
To facilitate easier studying of these types of vulnerabilities the tool scaffolding should be able to instrument itself to generate ASCII diagrams of payload object-graphs (similar to this) and deserialization code execution call-trees (similar to this) to understand the mechanics of each gadget chain better. Simply providing a list of gadget classes could be useful, and a more sophisticated implementation could embed and/or link to code/methods executed during deserialization.
Optionally allow such documentation to be printed to the console as verbose-mode help text when using the CLI interface.
PrintUtil
from #16 is probably a good start for object graph inspectionInstrumentation stuff:
The text was updated successfully, but these errors were encountered: