Web Shell Upload via Obfuscated File Extension

แชร์
ฝัง
  • เผยแพร่เมื่อ 3 ก.พ. 2025

ความคิดเห็น • 17

  • @jecajSudbine
    @jecajSudbine ปีที่แล้ว +2

    If I add to dir:
    php_flag engine off
    Would't that prevent all the shenanigans?

    • @intigriti
      @intigriti  ปีที่แล้ว +2

      Yep, any PHP files uploaded to the configured directory will be treated as text! Just make sure there's no other vulnerabilities, e.g. one of the portswigger labs involves overwriting a web config file, with an insecure file upload.

  • @mentaripagi__
    @mentaripagi__ ปีที่แล้ว +1

    Hello.
    Is Web Upload Vulnerability only common found in PHP based website? How about in other programming languange? Thank you

    • @intigriti
      @intigriti  ปีที่แล้ว +2

      Nope, you can definitely find it with other services, e.g. ASP(X) and JSP. Even if there is no opportunity for code execution, file upload vulnerabilities could be damaging in other ways!

  • @patrickFREE.
    @patrickFREE. 27 วันที่ผ่านมา

    If I upload system instead instead of file get contents, I can use linux commands. If I cat the secret file, I got another (sadly wrong) string. I can only solve this lap with file get contents, but why?

    • @intigriti
      @intigriti  25 วันที่ผ่านมา

      Hmmm maybe just the way Portswigger designed this lab 😕

    • @patrickFREE.
      @patrickFREE. 25 วันที่ผ่านมา

      @intigriti aah, I got a concadinated string, very interesting. Thanks bro!

  • @vilislacis3337
    @vilislacis3337 ปีที่แล้ว

    1) Upload file named test.php%00.jpg
    2) Open it via path /files/avatars/test.php

  • @acronproject
    @acronproject ปีที่แล้ว

    Thank you 💯💯💯💯

  • @MikeMasanga
    @MikeMasanga 25 วันที่ผ่านมา

    it doesnt allow me to submit the flag
    Seems like there is an error in recgnising the flag for this lab

    • @intigriti
      @intigriti  25 วันที่ผ่านมา

      Oh dear.. Maybe could wait for the lab to reset, if not ask in Portswigger discord server

    • @MikeMasanga
      @MikeMasanga 25 วันที่ผ่านมา

      @@intigriti i have already contacted them through their email they asked for screenshots i've also sent them
      Actually 2 days ago i tried to solve it and got the flag i tried to submit it it was showing the same error i hope they will fix it

  • @omega.Networx
    @omega.Networx ปีที่แล้ว

    Im so in over my head, drowning, in a swimming pool filled up with android acid rain, and fake system app puke accompanied by invisible 3rd party montioring certificate authorities punching on me, i wasnt invited to that party and these cyber bullys wont let me univite myself or allow me to have a running windows machine. Barly allowed to have a half unalive skitzophrenic chromebook, Im not gonna go as far to say, well yes i am. Somebody is angry with me. And its not a bot at this point. Robots tee tee oil, this is human waste products, i dont recall being stung by a jelly fish. I live ,300 miles from salt water , OK i tried to make it colorful to get someone that can help someones ATTENTION and sadly this probably wont work. And no help or HELPFUL ADVICE IS ON THE WAY. YALL KNOW NONE OF THE ANTI THIS OR THAT WORKS, am i doomed from having a smooth running machine for eternity? Or am i doomed for eternity?

    • @intigriti
      @intigriti  ปีที่แล้ว +1

      You're not doomed mate! Keep calm and hack on! 💜

  • @nicolaspanu7448
    @nicolaspanu7448 ปีที่แล้ว

    I uploaded the obfuscated php shell (exploit.php%00.jpg), and the server answered that the file had been uploaded but when I tried to request the uploaded php shell by right-clicking on the image icon and choosing the "Open in a new tab" functionality, I got a 404. I solved the lab by requesting the uploaded file stripped of the obfuscation, namely GET/files/avatars/exploit.php

    • @intigriti
      @intigriti  ปีที่แล้ว

      That's it!! Nicely done 👊