Exploiting a File Upload Vulnerability - MetaCTF

Поделиться
HTML-код
  • Опубликовано: 14 сен 2022
  • Follow me - beacons.page/shenetworks
    This challenge was apart of a Black Hills Information Security miniCTF
    Cyber Range - www.antisyphontraining.com/cy...
    BHIS Twitter - / bhinfosecurity
    Backdoor - gist.github.com/sente/4dbb2b7...
  • НаукаНаука

Комментарии • 31

  • @franklinstevens3540
    @franklinstevens3540 Год назад +5

    I really enjoyed this. The break down was top-notch and easy to follow. Thanks.

  • @nichetcher1
    @nichetcher1 7 месяцев назад

    So awesome to learn by watching you do this Ctf.

  • @poxishovel
    @poxishovel Год назад +1

    Love the video! Thanks for sharing your knowledge.

  • @Liquid6t9
    @Liquid6t9 Год назад +1

    Excellent content! Keep it up.

  • @dazztee
    @dazztee Год назад

    kool enjoyed, look forward to some more

  • @simonwatson5299
    @simonwatson5299 Год назад +1

    The last time I heard what sounded like 'rubber keys' was on my Sinclair 48K back in the 1980's, lol. If you've bought a keyboard with rubber keys, junk it. Lifes too short. Anyway, great video as always. And thanks for the FREE education, it's very much appreciated. Can't wait till next vid. 😚

  • @RMD80GAMER
    @RMD80GAMER Год назад

    Thank you for your hard work 😄

  • @steiner254
    @steiner254 Год назад

    Awesome!

  • @dafoxlana
    @dafoxlana 5 месяцев назад

    Thank you !! :)

  • @lazyguy9977
    @lazyguy9977 Год назад

    Good stuff

  • @user-pk3pl3qg7b
    @user-pk3pl3qg7b 11 месяцев назад +1

    how to learn find vulnerability ?

  • @user-bh3vo2dl9z
    @user-bh3vo2dl9z 8 месяцев назад

    what if there is permission, that outputting "Acess denied" in page?

  • @GamingTy12
    @GamingTy12 Год назад

    holy videos LETS GOOOOOOOOOOOOOO!

  • @8080VB
    @8080VB 20 часов назад

    Hey I just tried in a local php server to see if it works. Unfortunately it doesn't. I saw this method last day tried adding in multiple paths in an image. Still doesn't. This won't work in a Apache server or a php?

  • @Ankitverma-yc7zf
    @Ankitverma-yc7zf 2 месяца назад

    When I tried this on my local machine with apache web server, my server is not returning the image data as shown in your video instead of that my server is rendering the image. I dont understand that how in your browser the image is not rendering and server is giving the image data as text.

  • @ForeverMan
    @ForeverMan 4 месяца назад +1

    well, this exploit is IMPOSSIBLE... I have no idea how that server parsed a PNG as PHP, that might be part of the CTF but in real world, its impossible

    • @tiptrcks3960
      @tiptrcks3960 4 месяца назад

      Hey dude do you have any idea if the server converts the image to base64 and then appends it in src of img tag instead of relying on image path, then is there any way to go further?

  • @diwi_dw
    @diwi_dw Год назад

    👍👍

  • @kazhiroma9736
    @kazhiroma9736 4 месяца назад

    currently very similar challenge in picoCTF

  • @liamtwine2267
    @liamtwine2267 Год назад

    Omg. Your the most beautiful hacker I have ever seen. As a fellow pentester I see many people on a daily basis but you are incredible.

    • @LushRuins
      @LushRuins 11 месяцев назад

      simp

    • @Flaneur27
      @Flaneur27 7 месяцев назад +1

      Lmfaoo you can’t be serious Lmfaoo not the place to shoot your shot

  • @viniciusnascimento4285
    @viniciusnascimento4285 7 месяцев назад +1

    lol woman

  • @linuxturtorials9591
    @linuxturtorials9591 8 месяцев назад +2

    Assalam aleykum every man an and women must cover their bodies according to islam

    • @Yoyo_Glitch
      @Yoyo_Glitch 6 месяцев назад +1

      She's not muslim

  • @anuradhalakruwan1918
    @anuradhalakruwan1918 Год назад

    Friend I like learning Cybersecurity..... Please help me friend...?

  • @aminmgs9932
    @aminmgs9932 Год назад

    contains a virus so the upload was canceled: YARA.php_in_image.UNOFFICIAL FOUND pls help

  • @cakesnatcher4541
    @cakesnatcher4541 9 месяцев назад +1

    U can exploit Hadjis file anyday