강의

멘토링

로드맵

BEST
Security & Network

/

Computer Security

Analysis of File Upload Vulnerability Attack Techniques and Practical Cases by a Simulated Hacking Practitioner: PART 1

The ultimate web hacking master! File upload vulnerability attack technique! This is a training that will further improve the students' web hacking skills through a completely different approach from the existing known methods!

(4.9) 67 reviews

804 learners

  • crehacktive
Penetration Testing

Reviews from Early Learners

What you will learn!

  • How the file upload function works

  • File upload vulnerability principle

  • Understanding web shells and how they work

  • File upload vulnerability attack methodology

  • File Upload Vulnerability Secure Coding Techniques

  • Practical attack techniques

📖 A series of file upload vulnerability attacks, explained by a simulated hacking expert!

  • PART (1): Basics / Practical Attacks / Secure CodingCurrent Course
    This training covers the most crucial aspect of file upload vulnerability attacks, detailing the attack process with a completely different approach from previously known methods. You'll learn the fundamentals of attack, practical bypass techniques, case studies, various countermeasures, and secure coding. This essential training serves as the foundation for subsequent courses.
  • PART (2): Advanced Attack Techniques / In-Depth Practical Analysis
    This training covers advanced attack techniques and Web Application Firewall bypass techniques not covered in PART (1), and analyzes technical techniques used in practical environments through hands-on practice.
  • SKILL-UP: Webshell Obfuscation Techniques
    In today's web environment, the use of web shell detection solutions is increasing, and accordingly, analysts must possess the skills to bypass them. Therefore, this training will be essential for practitioners.

📖 File upload vulnerability?! What the heck is this!?

File upload vulnerabilities are an attack technique that utilizes a malicious script called a WebShell to take control of a server. The attack doesn't stop at a single server, but can extend into the internal network . This is truly a devastating attack!

📖 Why should you learn about file upload vulnerability attacks?

File upload functionality is essential in today's web environment. Most of the websites we frequently use have file upload functionality! What if a web shell, a malicious script for attack, were uploaded through this feature?

Numerous malicious hackers (black hackers) use this attack technique to penetrate internally via compromised web servers, deploying malware to employees, distributing ransomware, stealing confidential internal information, and stealing personal customer information. This is a truly terrifying attack!

Because of this influence, many companies cannot help but be sensitive to " file upload vulnerabilities ," and it is an attack technique that has even earned the title of " the ultimate boss " among practitioners!

If you are doing web hacking yourself or defending yourself, you now know what you need to know, right? ㅡ.,ㅡ;;

📖 Why should I take this course?

Those of you reading this right now likely fall into the following categories:

  • Beginners who are just starting out with web hacking
  • Beginner/intermediate level students who have just started studying web hacking.
  • A job seeker who graduated from a security academy
  • A diagnostician (consultant) who is making a diagnosis in practice

I would like to say it in one sentence.

" It helps everyone. "

This is the most persistent attack that digs into the field during diagnosis, and it is my personal favorite.
I would like to share with you the know-how I have gained over the years.

📖 Through detailed attack principle analysis
Education that even beginners can easily access!

The training will be conducted from the basics, including the operating principles of the file upload function and the principles of file upload vulnerabilities.
We will go through each step in detail so that even beginners can easily understand.

📖 From the principle of web shell operation
Practice creating your own web shell!

We'll cover the basic concepts, operating principles, and hands-on practice of creating a "web shell," a key element in file upload vulnerability attacks. Understanding web shells is essential!

📖 SKILL-UP through practical case studies~!!!

Expand your practical perspective with 12 case studies, and make the skills your own by practicing in the provided virtual environment!

📖 Provides a virtual practice environment for hands-on training!

A total of 18 virtual practice environments are provided for JSP and PHP!

📖 Learn secure coding by following along!
Secure coding technology is also improving!

We often see diagnosticians being strong on offense but weak on defense. This stems from language barriers and a lack of understanding of secure coding. Practice can help you overcome these barriers!

📖 Expected effects through education

  • A conceptual shift in file upload vulnerabilities
  • Correct Attack Guidelines
  • Improve your skills through a new perspective
  • Learn not only offensive skills but also defensive skills!

🛠 Programs covered here

  • Burp Suite
  • APMSetup
  • Tomcat

※ How to use Burp Suite is not covered in this training. You can refer to the basic usage method in the training "Stories about Web Hacking and Simulated Hacking in the Field."

💡 Must-see lectures

Web Technology Fundamentals You Must Know
A course to learn the basics of web technology
A story about web hacking and simulated hacking in the field.
Beginner's Guide to Learning Web Hacking

※ This training PPT uses Nanum font provided by Naver.

Recommended for
these people

Who is this course right for?

  • For everyone from beginners to advanced web hackers.

  • hands-on worker

  • For those who want to know more about file upload vulnerability attack techniques

Need to know before starting?

  • Web Basics

  • Web Hacking Basics

Hello
This is

26,082

Learners

1,381

Reviews

501

Answers

4.9

Rating

18

Courses

안녕하세요, 크리핵티브입니다.

다년간 다양한 웹 서비스를 진단하고 연구한 경험을 바탕으로, 실무에 바로 적용 가능한 지식을 인프런 플랫폼에서 공유해오고 있습니다.

그리고 웹 해킹 기초를 체계적으로 다룬 크리핵티브의 한 권으로 끝내는 웹 해킹 바이블집필했습니다. 기초가 부족한 분들께는 이 책으로 학습을 시작하실 것을 권합니다.

 

Curriculum

All

111 lectures ∙ (15hr 39min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

67 reviews

4.9

67 reviews

  • onejsh22504님의 프로필 이미지
    onejsh22504

    Reviews 1

    Average Rating 5.0

    5

    91% enrolled

    This seems to be the best lecture in the field of mock hacking. Since uploading is the key attack, I'm really looking forward to Part 2. When will I be able to see it??.....

    • crehacktive
      Instructor

      There were a lot of lectures to be made ahead of time, so I had no choice but to delay the schedule. I will make sure to complete it in the second half of the year.

  • news8376님의 프로필 이미지
    news8376

    Reviews 4

    Average Rating 5.0

    5

    100% enrolled

    These were really helpful classes. Thank you.

    • crehacktive
      Instructor

      I'm so glad it was helpful! Thank you so much for the great review.^^

  • jm04401162님의 프로필 이미지
    jm04401162

    Reviews 2

    Average Rating 5.0

    5

    100% enrolled

    great.

    • crehacktive
      Instructor

      5-star course review! Thank you so much! Have a nice day~!

  • whtjdals1106님의 프로필 이미지
    whtjdals1106

    Reviews 2

    Average Rating 5.0

    5

    98% enrolled

    I love it so much

    • crehacktive
      Instructor

      Thank you so much for the great review! Have a nice day~!

  • hwangjh2332님의 프로필 이미지
    hwangjh2332

    Reviews 8

    Average Rating 4.9

    5

    31% enrolled

    The content of the education is substantial.

    Limited time deal

    $51.70

    24%

    $68.20

    crehacktive's other courses

    Check out other courses by the instructor!

    Similar courses

    Explore other courses in the same field!