<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/styles/rss-style.xsl"?>

<rss version="2.0"
 xmlns:blogChannel="http://backend.userland.com/blogChannelModule"
>

<channel>
<title>houstonperlmongers.org</title>
<link>http://houstonperlmongers.org//posts/e9e1902d-14d7-11ec-852a-c1f18db8211e?format=xml</link>
<description>houstonperlmongers.org : /posts/e9e1902d-14d7-11ec-852a-c1f18db8211e</description>
<language>en</language>
<pubDate>2026-04-13T03:20:31</pubDate>
<lastBuildDate>2026-04-13T03:20:31</lastBuildDate>

<image>
<title>houstonperlmongers.org</title>
<url>/favicon.ico</url>
<link>http://houstonperlmongers.org</link>
<width>32</width>
<height>32</height>
<description>houstonperlmongers.org favicon</description>
</image>
<item>
<title>Weaponizing Perl Serialization Flaws with Metasploit</title>
<link>http://houstonperlmongers.org/posts/e9e1902d-14d7-11ec-852a-c1f18db8211e</link>
<description><![CDATA[
    <div class="date">April 2015</div>
    <div class="topic"><span class="label">Topic:</span>
      <a href="/talks/2015talks/1504Talk/index.html">Weaponizing Perl Serialization Flaws with Metasploit</a></div>
      
      <div class="presenter"><span class="label">Presenter:</span>
      John Lightsey</div>
      <div class="abstract">In recent years, there have been a few potential security flaws relating
to serialization libraries for dynamic languages. This presentation
introduces a few of these flaws and shows how they can be turned into
actual attacks using Metasploit.</div>
    
    
    
  ]]></description>
<author>Nobody</author>
<guid isPermaLink="true">http://houstonperlmongers.org/posts/e9e1902d-14d7-11ec-852a-c1f18db8211e</guid>
<pubDate>2015-04-21T00:00:00</pubDate>
<enclosure type="text/html" url="http://houstonperlmongers.org/posts/e9e1902d-14d7-11ec-852a-c1f18db8211e" />
</item>
<item>
<title>Weaponizing Perl Serialization Flaws with Metasploit</title>
<link>http://houstonperlmongers.org/posts/1429574400</link>
<description><![CDATA[
    <div class="date">April 2015</div>
    <div class="topic"><span class="label">Topic:</span>
      <a href="/talks/2015talks/1504Talk/index.html">Weaponizing Perl Serialization Flaws with Metasploit</a></div>
      
      <div class="presenter"><span class="label">Presenter:</span>
      John Lightsey</div>
      <div class="abstract">In recent years, there have been a few potential security flaws relating
to serialization libraries for dynamic languages. This presentation
introduces a few of these flaws and shows how they can be turned into
actual attacks using Metasploit.</div>
    
    
    
  ]]></description>
<author>Nobody</author>
<guid isPermaLink="true">http://houstonperlmongers.org/posts/1429574400</guid>
<pubDate>2015-04-21T00:00:00</pubDate>
<enclosure url="http://houstonperlmongers.org/posts/1429574400" type="text/html" />
</item>
</channel>
</rss>
