MicroSim 42 -- Advanced OWASP Exploitation & Detection (Expanded Edition)
Deserialization converts structured data back into objects. When applications deserialize untrusted input without validation, attackers can inject malicious objects that execute code during the deserialization process.
Remote Code Execution (RCE), denial of service, authentication bypass, privilege escalation. OWASP ranks this as A08:2021 (Software and Data Integrity Failures).
Submit serialized preferences object (Base64 encoded).
Try these simulated payloads:
AC ED 00 05 (0xACED) in HTTP bodyrO0AB\x80\x04\x95XML External Entity injection abuses XML parsers that resolve external entities. Attackers craft XML documents with entity declarations that reference local files, internal URLs, or trigger denial-of-service via recursive expansion (Billion Laughs).
Local file disclosure, SSRF to internal services, denial of service, port scanning. OWASP A05:2021 (Security Misconfiguration).
Upload XML data to import records into the system.
Try these attack payloads:
<!DOCTYPE in XML POST body<!ENTITY declarations referencing SYSTEM or PUBLICfile://, http://, ftp://Using non-cryptographic pseudo-random number generators (PRNGs) for security-sensitive values like session tokens, password reset codes, CSRF tokens, or API keys. These PRNGs have predictable output given the seed value.
Session hijacking, account takeover via predictable reset codes, CSRF bypass, authentication bypass. OWASP A02:2021 (Cryptographic Failures).
Compare weak PRNG vs cryptographic token generation.
Click a button above to generate tokens
Generate tokens to analyze entropy
Simulated: if you know the approximate timestamp, you can predict the reset code.
| Property | Weak PRNG | CSPRNG |
|---|---|---|
| Seed Source | Timestamp | OS entropy pool |
| Output Predictability | Deterministic | Unpredictable |
| Bits of Entropy | ~32 (timestamp) | 128-256 |
| Brute Force Time | Seconds | Heat death of universe |
secrets module (not random)crypto.getRandomValues()SecureRandom (not java.util.Random)Server-Side Request Forgery tricks the server into making HTTP requests to internal resources that should not be accessible from the internet. The server acts as a proxy, bypassing firewalls and network segmentation.
Access to cloud metadata (AWS/GCP/Azure credentials), internal admin panels, port scanning, data exfiltration. OWASP A10:2021 (Server-Side Request Forgery).
Enter a URL to generate a preview card for social sharing.
Try these targets:
file://, gopher://, dict:// schemesOccurs when applications fail to enforce authorization rules, allowing users to access resources or perform actions beyond their intended permissions. This is OWASP #1 risk: A01:2021.
Logged in as: jdoe (Role: user) | Your invoices: 1001, 1002
Try adding "role": "admin" to the JSON body
| Resource | Owner | jdoe Access |
|---|---|---|
| Invoice 1001 | jdoe | Authorized |
| Invoice 1002 | jdoe | Authorized |
| Invoice 1003 | asmith | Unauthorized |
| Invoice 1004 | bwilson | Unauthorized |
| Invoice 1005 | cjones | Unauthorized |