file upload injection

Поделиться
HTML-код
  • Опубликовано: 18 сен 2024
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/...
    Full Web Ethical Hacking Course: www.udemy.com/...
    Full Mobile Hacking Course: www.udemy.com/...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangya...
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Комментарии • 157

  • @LoiLiangYang
    @LoiLiangYang  3 года назад +97

    Technically, you don't have to use an interceptor to change the file's extension. I do it because it looks cooler.

    • @ShadowTactical
      @ShadowTactical 3 года назад +7

      Hlo, I love your videos. Can you also do a DDOS attacking video

    • @dilipparasu7476
      @dilipparasu7476 3 года назад +4

      You are officially cool 😏

    • @rahimmahat0007
      @rahimmahat0007 3 года назад

      If the web application is checking file type on client side then you need to intercept the request

    • @vargmagnolia7320
      @vargmagnolia7320 3 года назад +1

      🔥

    • @celvis4696
      @celvis4696 3 года назад +2

      Hi, I was wondering if you could teach me these skills. I am currently doing cyber security and pursuing it. I am in the 9th grade and really want to learn. My goal is be a pentester in the future. I've done cyber patriot for 3 years now and I really want to learn. Thanks in advance.

  • @caliorbroke
    @caliorbroke 3 года назад +47

    As a developer these videos are incredibly useful to me so I know what to look out for!

    • @ellixt4187
      @ellixt4187 3 года назад

      Uhm I hope every developer knows to serverside check file extensions

    • @caliorbroke
      @caliorbroke 3 года назад

      @@ellixt4187 I hope they do too, but these weaknesses exist because sometimes these things get overlooked, that's why these videos can be really informative to developers that are learning/starting out!

    • @TechViva888
      @TechViva888 8 месяцев назад

      Same bro

  • @finnishmilitarypolice762
    @finnishmilitarypolice762 3 года назад +25

    You know that real serious things go off when Loi says Game Over twice.

  • @naveenreddynaveenreddy7322
    @naveenreddynaveenreddy7322 3 года назад +1

    you only the best teaching of ethical hacking in youtube channel without expecting money from viewers

  • @rahimmahat0007
    @rahimmahat0007 3 года назад +2

    What a timing of vdo I was practicing this attack today in the morning. The only difference is I made payload using weevely
    Security Tip: To mitigate this kind of attack check the file type on client side and also on server side

  • @enzotulio38
    @enzotulio38 3 года назад +5

    there is no 100% secure server when loi turns on the foxy proxy😎👌

  • @Moezr2
    @Moezr2 3 года назад +7

    Hi, am really interested in bug bounty. I’m a beginner. Can you please tell me where to start or what I need to study. Thank you and your great. I really enjoy your videos. 🙏

  • @luvsec5469
    @luvsec5469 3 года назад +1

    I'm new to learning about hacking but I just wanted to say that I think you are a wonderful teacher.

  • @naveenreddynaveenreddy7322
    @naveenreddynaveenreddy7322 3 года назад +1

    Iam from india .iam praying the god to get your channel to 1 million subscribers .i subscribed your channel with 22 different gmail accounts .

    • @dr40xer
      @dr40xer 3 года назад +1

      Bruh you just decrease the growth rate of the channel

    • @naveenreddynaveenreddy7322
      @naveenreddynaveenreddy7322 3 года назад

      @@dr40xer yes realy

    • @dr40xer
      @dr40xer 3 года назад

      @@naveenreddynaveenreddy7322 ya if any one searches one channnel and subscribe with multiple accounts the reach of the channel decreases happned with my channel

  • @redolfboing7974
    @redolfboing7974 3 года назад +1

    Loi liang yang please I need your help what should I do whenever I log onto my computer everyday a cmd promo always pops up really fast with no letters in it also on my discord my account just keeps sending random sketchy fishing links to my friend that I didn’t even send what should I do idk if my account or whole computer has been compromised

  • @ScorpioSL
    @ScorpioSL 3 года назад +1

    If we are using a third party service for file storage then we dont have to worry about these attacks right?. Like azure blob storage

  • @LoiLiangYang
    @LoiLiangYang  3 года назад +1

    how else can we prevent this type of hacking technique?

    • @theboys-77
      @theboys-77 3 года назад

      Sir how to use websites vulnerability to hack

    • @BongoCaat
      @BongoCaat 3 года назад

      disconnect wifi pro

    • @Alain9-1
      @Alain9-1 3 года назад

      Define a size for uploading files

    • @z3jlewhhda376
      @z3jlewhhda376 3 года назад

      Whitelist image file types

    • @lonewolfcoding5208
      @lonewolfcoding5208 2 года назад

      ithink Deep Content Disarm and Reconstruction

  • @kambrk7444
    @kambrk7444 3 года назад +2

    Hi , I remember that you made a video about 5 signs that your computer is hacked. Coud you make another tutorial on how to remove a hacker from computer?

  • @prakashshende8654
    @prakashshende8654 3 года назад

    Changing extension also helpful I read in book such give the script.php to image.img

  • @kadirhussain7365
    @kadirhussain7365 3 года назад +2

    Sir how to hack someone's whatsapp without taking his phone

  • @HN-vg3ds
    @HN-vg3ds 3 года назад +1

    I really enjoy sir to see your video ❤

  • @samvrittiwari351
    @samvrittiwari351 3 года назад +1

    Can you please help us know that how can we secure ourselves from this attack

  • @febbriandonguila2077
    @febbriandonguila2077 3 года назад +1

    I love watching this kind of stuff even I don't understand.

    • @dr40xer
      @dr40xer 3 года назад

      Bruh

    • @febbriandonguila2077
      @febbriandonguila2077 3 года назад

      @@dr40xer as of now I'm still learning c# that's I don't really understand what his doing.

    • @febbriandonguila2077
      @febbriandonguila2077 3 года назад

      why*

    • @dr40xer
      @dr40xer 3 года назад

      @@febbriandonguila2077 it's good I learnt python and now I am learning ethical h.ckiing

    • @dr40xer
      @dr40xer 3 года назад

      @@febbriandonguila2077 in easy words he make a back door useing msf venom and keep extension .php and just upload a backdoor in the the website and he was listening for incoming connection using metasploit and after that he opened the backdoor and he got the acess of the website admin terminal (idk all about it bcz i am newable😅
      👉👈

  • @mohammadmaniruddin7921
    @mohammadmaniruddin7921 3 года назад

    I am not hacker but I love hacking things....
    Love you from Bangladesh

  • @naveenreddynaveenreddy7322
    @naveenreddynaveenreddy7322 3 года назад +1

    your my best

  • @shunhasfaithfaith6693
    @shunhasfaithfaith6693 3 года назад

    will your course on udemy include encryption and bypassing av runtime?

  • @yassintantawy2251
    @yassintantawy2251 3 года назад

    I am a new in this world of hackers I need to learn many things but I have time for it I from egypt

  • @THEASLAM100M
    @THEASLAM100M 3 года назад +1

    Sir. Help me my wifi adapter not working in kali but wifi is show by installing wifi driver. What i should do. Please help

  • @raghavareddychilakala657
    @raghavareddychilakala657 3 года назад

    Hai loi please make an video about how to setup an virtual environment (including servers , client machines, etc..) for practice hacking.

  • @TheSuitedDuck
    @TheSuitedDuck 3 года назад

    in the intro i thought i was getting messaged

  • @b07x
    @b07x 3 года назад

    You can also use p0wny shell

  • @abmoeez19
    @abmoeez19 3 года назад +1

    Hey can you plzz tell me any software for emoji remover plzzzzz

  • @SAHIL-gw2yp
    @SAHIL-gw2yp 3 года назад

    tell something about pegasus

  • @redouaneotmani7050
    @redouaneotmani7050 2 года назад

    Dude! Such an excellent explanation ! Thank you so much :)

  • @TellaTrix
    @TellaTrix 3 года назад

    please make video on Israeli surveillance software 'Pegasus' ? just to head start.

  • @hackersdom
    @hackersdom 3 года назад +1

    I love this channel..

  • @JUSTFUN-hy6ns
    @JUSTFUN-hy6ns 3 года назад +1

    loi sir thanks for teaching me this ...!!!!!

  • @ghassenbarkache1676
    @ghassenbarkache1676 10 месяцев назад

    What if the web application does not check the file content type or the code in it; but the server side filter the file extensions ; and also when you upload a picture anything before .jpeg or .png is given a random name
    Even if it pic.php%00.png => randomname.png so it will not be executed
    Even if I changed the content type to application/x-php nothing is executed
    What do you suggest ?

  • @programmer8132
    @programmer8132 3 года назад +1

    What if i only accept image with jpg png image?

  • @hrisikeshroy9976
    @hrisikeshroy9976 3 года назад

    Why u don't use a proxy chaining

  • @SomeFalseGenius
    @SomeFalseGenius 3 года назад

    What if they close the tab? And as dumb as it sounds can you do alot when you get access to the computer in metasploit?

  • @muhammadriekihredaya6153
    @muhammadriekihredaya6153 3 года назад +1

    How to decrypt file .gujd pls help mee

  • @crazycriminalbj7580
    @crazycriminalbj7580 3 года назад

    sir can you say about pegasus spyware

  • @wergwerg-n1y
    @wergwerg-n1y 3 года назад

    BRRRRRRRRRRRRRROOOOOOOOOOOOOOOOOOO MOST SITES HAVE RESTRICTIONS OMLLLLLLLL

  • @sihmy9870
    @sihmy9870 3 года назад

    Consistency at peek..

  • @hottinroof7159
    @hottinroof7159 3 года назад

    Please make a vlog on Pegasus.

  • @lhandbhel
    @lhandbhel 3 года назад

    Sir, may I know what is your keyboard? Thanks!

  • @johnstevenson6366
    @johnstevenson6366 3 года назад

    But what if you upload a photo that is a payload...

  • @NaveenKumar-es6le
    @NaveenKumar-es6le 3 года назад

    i gotta ask a question the website where you try exploitation, can we also try to exploit the same website like you do

  • @lidorschristineh1202
    @lidorschristineh1202 3 года назад

    we love you from Madagascar

  • @romaincharles3568
    @romaincharles3568 Год назад

    does it work only in local ?

  • @andresdapena2747
    @andresdapena2747 3 года назад

    Mr. Loi as a developer how can i prevent this in my web sites?

  • @himanshubomble140
    @himanshubomble140 3 года назад

    do cybersecurity professionals require competitive coding?

    • @TechnologicNick
      @TechnologicNick 3 года назад +1

      No

    • @v380riMz
      @v380riMz 2 года назад +1

      No you’re better off having a good HTB/THM rank.

  • @tgdeveloper6809
    @tgdeveloper6809 3 года назад +1

    You are best forever

  • @marcush3ll673
    @marcush3ll673 3 года назад +2

    Love from India !!! ❤️

  • @TEJAS_HACKER
    @TEJAS_HACKER 3 года назад

    Can you please make video on hacking any purchase software totally free from any old website

  • @esayazdanpana1458
    @esayazdanpana1458 3 года назад

    Great, Tanx!

  • @studiospan6426
    @studiospan6426 Год назад

    What if I can upload the .php file but it don't know where it is being saved is it still exploitable or not

  • @tayositubondo3836
    @tayositubondo3836 3 года назад

    Is this work too in "termux " ?

  • @cramello5160
    @cramello5160 3 года назад

    mv: cannot move 'hackercra.php' to './desktop/craloireverseshell.php': No such file or directory why ?

  • @darkshadow6962
    @darkshadow6962 3 года назад

    Game over

  • @marcush3ll673
    @marcush3ll673 3 года назад +1

    Uh are always GOD , sir 🙏❤️

  • @Shikigami_Wrld999
    @Shikigami_Wrld999 3 года назад

    Love your work..

  • @user-yv3jy3eo7x
    @user-yv3jy3eo7x 3 года назад

    dang your upload daily lolol haah

  • @mr.hackme7435
    @mr.hackme7435 3 года назад +1

    Hacker ❤️

  • @unisos
    @unisos 3 года назад

    Why not just change the extension of the PHP file to PHP3 then upload it instead of intercepting the upload request to do that??

    •  3 года назад

      Your initial file was .php and meterpreter won't recognise your file after you change the extension.Also,there is no way you can change your file's extension after uploading it.

  • @snakesman5972
    @snakesman5972 3 года назад

    can admins of the server or who is protecting the web app detect us after uploading?

  • @sudiptosarkar4060
    @sudiptosarkar4060 2 года назад

    My cpanel is hacked .I cannot enter into my cpanel .How can I fix this problem?

  • @realslimchaggy
    @realslimchaggy 3 года назад

    I reallllllllly like this video, TNX

  • @rajendrakhadka9563
    @rajendrakhadka9563 3 года назад

    Sir i want learn hacking so how to do what do

  • @danielwang4901
    @danielwang4901 Год назад

    Does the server have to run on php for this payload to work?

  • @abdetr0_177
    @abdetr0_177 3 года назад

    I didnt understand this its just upload the virus? Or i should do somthing?

  • @moysevalentine6117
    @moysevalentine6117 3 года назад

    Hello, please I need help from you, sir, someone collected money from my sister and we can't see the person again. What tools can you recommend to track the person through his phone number

  • @waterlord6969
    @waterlord6969 3 года назад

    Finally a new video 😁

  • @logeshkanna1509
    @logeshkanna1509 3 года назад +1

    Hi sir , is m1 macbook is good for hacker or developer

    • @dr40xer
      @dr40xer 3 года назад +1

      Ya it is good for programing but you need a os for running tools so you need linux or pre-installed tools linux

    • @logeshkanna1509
      @logeshkanna1509 3 года назад +1

      @@dr40xer yeah that's ok but how can i run linux in m1 mac book, it does not support virtualization and boot camp also not supported becoz its a ARM chipset.......... 😭

    • @dr40xer
      @dr40xer 3 года назад +1

      @@logeshkanna1509 I don't know much about apple products it may support vm ware or application like that or else you can buy a raspberry pie

    • @logeshkanna1509
      @logeshkanna1509 3 года назад +2

      @@dr40xer yeah okay thanks for your info

    • @dr40xer
      @dr40xer 3 года назад

      @@logeshkanna1509 np

  • @sherifmohamed2938
    @sherifmohamed2938 3 года назад

    I want to buy your course on Udemy, but there is no Arabic translation for the course

  • @alphaneo210
    @alphaneo210 3 года назад

    This guy actually has 404k subs 😂 no glitches in the matrix so far 😌

  • @bagdats6971
    @bagdats6971 3 года назад

    why are you screaming on the thumbnail?

  • @kunaalnamdas7100
    @kunaalnamdas7100 3 года назад

    Big fan sir

  • @muhammadalfarizi6069
    @muhammadalfarizi6069 3 года назад

    How about tamper data for jpg/png?
    I cant upload the php file

  • @a.a.marafath9368
    @a.a.marafath9368 3 года назад

    Hello sir,
    Can u make a tutorial to install bwapp
    I clicked install
    It shows error when I click install
    Most people say to create a data base I don't have idea to what to do
    Please can you make a A-z tutorial on that topic

  • @xxl1582
    @xxl1582 Год назад

    作为一名中国人 我认为你的作品没有一点技术含量wbe0.3的网络时代你在这里演示上传漏洞?

    • @bigdog4166
      @bigdog4166 Год назад

      These exploits still exist you gotta know where to look

  • @funny-yr9rm
    @funny-yr9rm 3 года назад

    Love it

  • @karimmirak2158
    @karimmirak2158 3 года назад

    Almostly your solutions are useless, the solution is to make a separate servers depending on their needs, such as : a server for file handling (upload/download) and whatever the user upload the server will not execute it, just stream it as it's , and an example of that is AWS S3. And the other servers for other needs too , email server alone, and server side rendering , API servers, ... ,By this way the service have a great control and smooth maintenance and cost effective and scalability too.

  • @wendyofficiel2678
    @wendyofficiel2678 Год назад

    Hello can you learn me please

  • @mahdiomar5799
    @mahdiomar5799 5 месяцев назад

    Thank you ling ling

  • @darkshadow6962
    @darkshadow6962 3 года назад

    Boy and girl and human

  • @ibrahim-tech
    @ibrahim-tech 3 года назад

    Hi

  • @Alex-if2gd
    @Alex-if2gd 3 года назад

    do you have any video or tutorial available for downloading WebGoat on mac? I can’t seem to figure it out...

  • @chelo6664
    @chelo6664 3 года назад +1

    Yoo

  • @realslimchaggy
    @realslimchaggy 3 года назад

    brother, can i create a jpg file which van transform to a php after minutes

  • @Alain9-1
    @Alain9-1 3 года назад

    This contenet is too much to be free

  • @highlow8683
    @highlow8683 3 года назад

    this channel has taught me to be scared of literally everything on the internet

  • @reachingstar3536
    @reachingstar3536 3 года назад

    H ❤️ sir 👍

  • @Miscellaneous42268
    @Miscellaneous42268 3 года назад

    Sir give a tutorial about DDOS

  • @ibrahim-tech
    @ibrahim-tech 3 года назад +1

    1st

  • @popeakhenaton6259
    @popeakhenaton6259 3 года назад

    5th

  • @fahimprodhan6454
    @fahimprodhan6454 3 года назад

    Teach me how to ethically hack your website?

  • @Alexander-vo4gv
    @Alexander-vo4gv 3 года назад

    First lol love the content