Analysis of File Upload Vulnerability Attack Techniques and Practical Cases by a Simulated Hacking Practitioner: PART 1
The ultimate web hacking master! File upload vulnerability attack technique! This is a training that will further improve the students' web hacking skills through a completely different approach from the existing known methods!
ð A series of file upload vulnerability attacks, explained by a simulated hacking expert!
PART (1): Basics / Practical Attacks / Secure Coding â Current Course This training covers the most crucial aspect of file upload vulnerability attacks, detailing the attack process with a completely different approach from previously known methods. You'll learn the fundamentals of attack, practical bypass techniques, case studies, various countermeasures, and secure coding. This essential training serves as the foundation for subsequent courses.
PART (2): Advanced Attack Techniques / In-Depth Practical Analysis This training covers advanced attack techniques and Web Application Firewall bypass techniques not covered in PART (1), and analyzes technical techniques used in practical environments through hands-on practice.
SKILL-UP: Webshell Obfuscation Techniques In today's web environment, the use of web shell detection solutions is increasing, and accordingly, analysts must possess the skills to bypass them. Therefore, this training will be essential for practitioners.
ð File upload vulnerability?! What the heck is this!?
File upload vulnerabilities are an attack technique that utilizes a malicious script called a WebShell to take control of a server. The attack doesn't stop at a single server, but can extend into the internal network . This is truly a devastating attack!
ð Why should you learn about file upload vulnerability attacks?
File upload functionality is essential in today's web environment. Most of the websites we frequently use have file upload functionality! What if a web shell, a malicious script for attack, were uploaded through this feature?
Numerous malicious hackers (black hackers) use this attack technique to penetrate internally via compromised web servers, deploying malware to employees, distributing ransomware, stealing confidential internal information, and stealing personal customer information. This is a truly terrifying attack!
Because of this influence, many companies cannot help but be sensitive to " file upload vulnerabilities ," and it is an attack technique that has even earned the title of " the ultimate boss " among practitioners!
If you are doing web hacking yourself or defending yourself, you now know what you need to know, right? ã ¡.,ã ¡;;
ð Why should I take this course?
Those of you reading this right now likely fall into the following categories:
Beginners who are just starting out with web hacking
Beginner/intermediate level students who have just started studying web hacking.
A job seeker who graduated from a security academy
A diagnostician (consultant) who is making a diagnosis in practice
I would like to say it in one sentence.
" It helps everyone. "
This is the most persistent attack that digs into the field during diagnosis, and it is my personal favorite. I would like to share with you the know-how I have gained over the years.
ð Through detailed attack principle analysis Education that even beginners can easily access!
The training will be conducted from the basics, including the operating principles of the file upload function and the principles of file upload vulnerabilities. We will go through each step in detail so that even beginners can easily understand.
ð From the principle of web shell operation Practice creating your own web shell!
We'll cover the basic concepts, operating principles, and hands-on practice of creating a "web shell," a key element in file upload vulnerability attacks. Understanding web shells is essential!
ð SKILL-UP through practical case studies~!!!
Expand your practical perspective with 12 case studies, and make the skills your own by practicing in the provided virtual environment!
ð Provides a virtual practice environment for hands-on training!
A total of 18 virtual practice environments are provided for JSP and PHP!
ð Learn secure coding by following along! Secure coding technology is also improving!
We often see diagnosticians being strong on offense but weak on defense. This stems from language barriers and a lack of understanding of secure coding. Practice can help you overcome these barriers!
ð Expected effects through education
A conceptual shift in file upload vulnerabilities
Correct Attack Guidelines
Improve your skills through a new perspective
Learn not only offensive skills but also defensive skills!
ð Programs covered here
Burp Suite
APMSetup
Tomcat
â» How to use Burp Suite is not covered in this training. You can refer to the basic usage method in the training "Stories about Web Hacking and Simulated Hacking in the Field."