Web Application Hacking - File Upload Attacks Explained
HTML-код
- Опубликовано: 5 июл 2024
- 00:00 Intro
00:40 File uploads primer
03:33 Lab 1: Popcorn
08:59 Chaining vulnerabilities
10:02 Path traversal
16:55 Outro
Pentests & Security Consulting: tcm-sec.com
Get Trained: academy.tcm-sec.com
Get Certified: certifications.tcm-sec.com
Merch: merch.tcm-sec.com
Sponsorship Inquiries: info@thecybermentor.com
📱Social Media📱
___________________________________________
Twitter: / thecybermentor
Twitch: / thecybermentor
Instagram: / thecybermentor
LinkedIn: / heathadams
TikTok: / thecybermentor
Discord: / discord
💸Donate💸
___________________________________________
Like the channel? Please consider supporting me on Patreon:
/ thecybermentor
Support the stream (one-time): streamlabs.com/thecybermentor
Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: amzn.to/31GN7iX
The Hacker Playbook 3: amzn.to/34XkIY2
Hacking: The Art of Exploitation: amzn.to/2VchDyL
The Web Application Hacker's Handbook: amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: amzn.to/2V9srOe
Social Engineering: The Science of Human Hacking: amzn.to/31HAmVx
Linux Basics for Hackers: amzn.to/34WvcXP
Python Crash Course, 2nd Edition: amzn.to/30gINu0
Violent Python: amzn.to/2QoGoJn
Black Hat Python: amzn.to/2V9GpQk
My Build:
lg 32gk850g-b 32" Gaming Monitor:amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: amzn.to/30d1UW1
EVGA 2080TI: amzn.to/30d2lj7
MSI Z390 MotherBoard: amzn.to/30eu5TL
Intel 9700K: amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: amzn.to/2M638Zb
Razer Nommo Chroma Speakers: amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: amzn.to/31MOgpu
My Recording Equipment:
Panasonic G85 4K Camera: amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: amzn.to/2LIRxAp
Aston Origin Microphone: amzn.to/2LFtNNE
Rode VideoMicro: amzn.to/309yLKH
Mackie PROFX8V2 Mixer: amzn.to/31HKOMB
Elgato Cam Link 4K: amzn.to/2QlicYx
Elgate Stream Deck: amzn.to/2OlchA5
*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites. Наука
These videos are great, but could you knock up the volume by like 20%? Just a tad quiet, other than that, excellent stuff!
This series is just getting better, keep it coming!
Nice one, I'm loving this series!
Another great lesson. Thanks, Alex!
The path traversal combined with upload attacks is new to me, i like it
Great ❤ Thanks for the video..
Thanks for the information 🛡️
Awesome Video ♥️♥️♥️♥️
You guys are doing God's work. Thank you so much
You guys rock.. I'm learning heaps with ur videos. How can I get an internship at TCM security ??? 👂👂👂👊👊👊
would love to know more about Oauth Misconfiguration and HTTP request smuggling
Good video very helpful
I'm happy with the new web hacking oriented videos. my wish would be that there are more videos of this kind based on the top 10 owasp 2021. good luck for the rest
Unfortunately the audio stream for this file is very very low I've tried it on the number of devices please when making a video boost your audio
We want ssrf and csrf video
But in 99% of the cases. Even if you can upload a php shell for example. There is no way to navigate to the php shell upload via url to even execute it. In a real life senario with pretty much all websites these days. Your not going to be able to access the php upload to even execute it.
Depends on how the application has been designed. For example, if the app stores files in the application root (which they should not), then users will be able to access it
@@1952JBoy it's rare nowadays, but yeah it's the way to exploit this
nice username lol