Skip to Content
Learn Ethical Hacking from Scratch
book

Learn Ethical Hacking from Scratch

by Zaid Sabih
July 2018
Beginner
564 pages
12h 22m
English
Packt Publishing
Content preview from Learn Ethical Hacking from Scratch

File upload vulnerabilities

In this chapter, we're going to have a look at file upload vulnerabilities. This is the simplest type of vulnerability because it allows us to upload any type of file. For example, if the target computer can understand PHP, then we can upload any PHP file or a PHP shell and get full control over the target computer.

If the target computer or the target server understands Python then we can just upload Python code or Python Shell. We can create these shells using Veil-Evasion or Metasploit, or we can use our own PHP or Python Shell.

In the next section, we are going to have a look at a tool called Weevely that generates PHP shells and allows us to gain access to and do a number of cool things on the target computer. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Learn Ethical Hacking From Scratch

Learn Ethical Hacking From Scratch

Zaid Sabih
Ethical Hacking Masterclass

Ethical Hacking Masterclass

SUNIL GUPTA (India), Sunil Gupta
Ethical Hacking

Ethical Hacking

Ric Messier
Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781788622059Supplemental Content