From 3b4218e2a637c84e1a2b1f485ef0979416df27a8 Mon Sep 17 00:00:00 2001 From: Jaimin Gohel Date: Wed, 20 Mar 2019 12:19:25 +0530 Subject: [PATCH] Added CTF writeup in reference section Added below URL: https://medium.com/@jaimin_gohel/ctf-writeup-php-object-injection-in-kaspersky-ctf-28a68805610d --- Insecure Deserialization/PHP.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Insecure Deserialization/PHP.md b/Insecure Deserialization/PHP.md index bd824470..da38348d 100644 --- a/Insecure Deserialization/PHP.md +++ b/Insecure Deserialization/PHP.md @@ -161,4 +161,5 @@ phpggc monolog/rce1 'phpinfo();' -s * [PHP Generic Gadget - ambionics security](https://www.ambionics.io/blog/php-generic-gadget-chains) * [POC2009 Shocking News in PHP Exploitation](https://www.owasp.org/images/f/f6/POC2009-ShockingNewsInPHPExploitation.pdf) * [PHP Internals Book - Serialization](http://www.phpinternalsbook.com/classes_objects/serialization.html) -* [TSULOTT Web challenge write-up from MeePwn CTF 1st 2017 by Rawsec](https://rawsec.ml/en/MeePwn-2017-write-ups/#tsulott-web) \ No newline at end of file +* [TSULOTT Web challenge write-up from MeePwn CTF 1st 2017 by Rawsec](https://rawsec.ml/en/MeePwn-2017-write-ups/#tsulott-web) +* [CTF writeup: PHP object injection in kaspersky CTF](https://medium.com/@jaimin_gohel/ctf-writeup-php-object-injection-in-kaspersky-ctf-28a68805610d)