mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-14 08:57:55 +00:00
commit
bf90cfafc8
1 changed files with 2 additions and 0 deletions
|
@ -163,6 +163,8 @@ class P(object):
|
|||
print(base64.b64encode(pickle.dumps(P())))
|
||||
```
|
||||
|
||||
Before checking the bypass technique, try using `print(base64.b64encode(pickle.dumps(P(),2)))` to generate an object that is compatible with python2 if you're running python3.
|
||||
|
||||
For more information about escaping from **pickle jails** check:
|
||||
|
||||
{% content-ref url="../../generic-methodologies-and-resources/python/bypass-python-sandboxes/" %}
|
||||
|
|
Loading…
Reference in a new issue