I am preparing for the MCTS exam 70-536 and reading the book "Self-study MCTS Kit exam 70 536 application development framework for the microsoft second edition"
In Chapter 5, Serialization, below is a statement that has alerted me.
You must check the data in your serialization constructor and throw a SerializationException if invalid data is specified. The risk is that an attacker may use your class but provide fake serialization of information in an attempt to exploit weakness.
I understand the reliability of the data, but I canβt understand how an attacker can fake serialization information. I would like to know this from the point of view of an example (either in code or in concept). I searched the web but couldn't think of anything.
source share