I think it's a good lecture. I'll review it again and make sure to memorize the good content.
What you will gain after the course
Webshell Basic Concepts
How to create a web shell
How web shell works
Webshell detection solution concept
Background of the emergence of web shell detection solutions
Attack methodology in a web shell detection solution environment
Web shell obfuscation techniques
📖 A series of file upload vulnerability attacks, explained by a simulated hacking expert!
PART (1): Basics / Practical Attacks / Secure Coding This training covers the most crucial aspect of file upload vulnerability attacks, detailing the attack process with a completely different approach from previously known methods. You'll learn the fundamentals of attack, practical bypass techniques, case studies, various countermeasures, and secure coding. This essential training serves as the foundation for subsequent courses.
PART (2): Advanced Attack Techniques / In-Depth Practical Analysis This course teaches advanced attack techniques and Web Application Firewall bypass techniques not covered in PART (1), and analyzes technical techniques used in practical environments through hands-on practice.
SKILL-UP: Webshell Obfuscation Techniques◀ Current Course In today's web environment, the use of web shell detection solutions is increasing, and accordingly, analysts must possess the skills to bypass them. Therefore, this training will be essential for practitioners.
The frequency of hacking in today's web service environment continues to rise. Consequently, security solutions for web services are emerging and evolving, and one of these solutions is the " web shell detection solution ."
However, for the attacking diagnostician, security solutions are also a mountain to overcome! For this reason , understanding and mastering web shell obfuscation techniques is a must!
📖 Web shell obfuscation techniques that can be applied immediately in practice!
You'll learn practical web shell obfuscation techniques, proven and applied in practice, to bypass web shell detection solutions! And because obfuscation techniques are applied after identifying detection points, bypassing them is simple and easy!
📖 From the principle of web shell operation Practice creating your own web shell!
Understanding web shells is essential for bypassing web shell detection solutions, right? We will cover the basic concepts, operating principles, and even hands-on practice of creating a "web shell."
📖 Anyone who wants to Skill-Up! Grow through this course!
This training is suitable for both beginners and practitioners alike! Of course, we recommend taking the course with at least some understanding of file upload vulnerabilities.
This will be an opportunity to enjoy diagnosing the web shell detection solution environment that can be experienced during practical diagnosis!
Based on my years of experience diagnosing and researching various web services, I have been sharing practical, job-ready knowledge through the Inflearn platform.
I also authored Crehacktive's All-in-One Web Hacking Bible, which systematically covers the basics of web hacking. For those who lack foundational knowledge, I recommend starting your studies with this book.