강의

멘토링

로드맵

Inflearn brand logo image
BEST
Security & Network

/

Computer Security

Analysis of File Upload Vulnerability Attack Techniques and Practical Cases by a Simulated Hacking Practitioner: PART 1

The ultimate web hacking master! File upload vulnerability attack technique! This is a training that will further improve the students' web hacking skills through a completely different approach from the existing known methods!

(4.9) 65 reviews

793 learners

  • crehacktive
Penetration Testing

Reviews from Early Learners

What you will learn!

  • How the file upload function works

  • File upload vulnerability principle

  • Understanding web shells and how they work

  • File upload vulnerability attack methodology

  • File Upload Vulnerability Secure Coding Techniques

  • Practical attack techniques

📖 A series of file upload vulnerability attacks, explained by a simulated hacking expert!

  • PART (1): Basics / Practical Attacks / Secure Coding ◀ Current Course
    This training covers the most crucial aspect of file upload vulnerability attacks, detailing the attack process with a completely different approach from previously known methods. You'll learn the fundamentals of attack, practical bypass techniques, case studies, various countermeasures, and secure coding. This essential training serves as the foundation for subsequent courses.
  • PART (2): Advanced Attack Techniques / In-Depth Practical Analysis
    This training covers advanced attack techniques and Web Application Firewall bypass techniques not covered in PART (1), and analyzes technical techniques used in practical environments through hands-on practice.
  • SKILL-UP: Webshell Obfuscation Techniques
    In today's web environment, the use of web shell detection solutions is increasing, and accordingly, analysts must possess the skills to bypass them. Therefore, this training will be essential for practitioners.

📖 File upload vulnerability?! What the heck is this!?

File upload vulnerabilities are an attack technique that utilizes a malicious script called a WebShell to take control of a server. The attack doesn't stop at a single server, but can extend into the internal network . This is truly a devastating attack!

📖 Why should you learn about file upload vulnerability attacks?

File upload functionality is essential in today's web environment. Most of the websites we frequently use have file upload functionality! What if a web shell, a malicious script for attack, were uploaded through this feature?

Numerous malicious hackers (black hackers) use this attack technique to penetrate internally via compromised web servers, deploying malware to employees, distributing ransomware, stealing confidential internal information, and stealing personal customer information. This is a truly terrifying attack!

Because of this influence, many companies cannot help but be sensitive to " file upload vulnerabilities ," and it is an attack technique that has even earned the title of " the ultimate boss " among practitioners!

If you are doing web hacking yourself or defending yourself, you now know what you need to know, right? ㅡ.,ㅡ;;

📖 Why should I take this course?

Those of you reading this right now likely fall into the following categories:

  • Beginners who are just starting out with web hacking
  • Beginner/intermediate level students who have just started studying web hacking.
  • A job seeker who graduated from a security academy
  • A diagnostician (consultant) who is making a diagnosis in practice

I would like to say it in one sentence.

" It helps everyone. "

This is the most persistent attack that digs into the field during diagnosis, and it is my personal favorite.
I would like to share with you the know-how I have gained over the years.

📖 Through detailed attack principle analysis
Education that even beginners can easily access!

The training will be conducted from the basics, including the operating principles of the file upload function and the principles of file upload vulnerabilities.
We will go through each step in detail so that even beginners can easily understand.

📖 From the principle of web shell operation
Practice creating your own web shell!

We'll cover the basic concepts, operating principles, and hands-on practice of creating a "web shell," a key element in file upload vulnerability attacks. Understanding web shells is essential!

📖 SKILL-UP through practical case studies~!!!

Expand your practical perspective with 12 case studies, and make the skills your own by practicing in the provided virtual environment!

📖 Provides a virtual practice environment for hands-on training!

A total of 18 virtual practice environments are provided for JSP and PHP!

📖 Learn secure coding by following along!
Secure coding technology is also improving!

We often see diagnosticians being strong on offense but weak on defense. This stems from language barriers and a lack of understanding of secure coding. Practice can help you overcome these barriers!

📖 Expected effects through education

  • A conceptual shift in file upload vulnerabilities
  • Correct Attack Guidelines
  • Improve your skills through a new perspective
  • Learn not only offensive skills but also defensive skills!

🛠 Programs covered here

  • Burp Suite
  • APMSetup
  • Tomcat

※ How to use Burp Suite is not covered in this training. You can refer to the basic usage method in the training "Stories about Web Hacking and Simulated Hacking in the Field."

💡 Must-see lectures

Web Technology Fundamentals You Must Know
A course to learn the basics of web technology
A story about web hacking and simulated hacking in the field.
Beginner's Guide to Learning Web Hacking

※ This training PPT uses Nanum font provided by Naver.

Recommended for
these people

Who is this course right for?

  • For everyone from beginners to advanced web hackers.

  • hands-on worker

  • For those who want to know more about file upload vulnerability attack techniques

Need to know before starting?

  • Web Basics

  • Web Hacking Basics

Hello
This is

25,880

Learners

1,361

Reviews

497

Answers

4.9

Rating

18

Courses

:: 국낎 정볎볎안 솔룚션 개발 êž°ì—… 재직 ::
- 앱 위변조 방지 솔룚션 : 믞듀웚얎 닎당 / 핎킹 대회 욎영진 / 국낎 유명 핎킹/ë°©ì–Ž 훈렚장 제작

:: 국낎 정볎볎안 전묞 업첎 재직 ::
- 랔랙박슀 몚의핎킹 / 시나늬였 êž°ë°˜ 몚의핎킹 / 웹 췚앜점 진닚 / 몚바음 췚앜점 진닚 / 소슀윔드 췚앜점 진닚 / APT 몚의 훈령 / DDoS 몚의훈렚 / 읞프띌 진닚 / 슀마튞 가전 진닚
- 국낎 대Ʞ업, 쀑소Ʞ업 닀수 진닚

:: 왞부 교육 및 활동 ::
- 멀티캠퍌슀, 국가 볎안 Ʞ술 연구소(ETRI)
- 국낎 정볎볎안 업첎 : 재직자 대상 "웹 몚의핎킹 심화 교육" 진행쀑
- 핎컀팩토늬 묞제 제작

:: 췚앜점 발견 ::

1) Web Application Server 췚앜점
- TMAX JEUS : 원격 명령얎 싀행 췚앜점(Remote Command Execution Vulnerability)
- IBM WebSphere(CVE-2020-4163) : 원격 명령얎 싀행 췚앜점(Remote Command Execution Vulnerability)

2) CMS(Contents Management System) 췚앜점
- 넀읎버 슀마튞에디터 : 파음 업로드 췚앜점
- 귞누볎드 : SQL Injection , 파음 업로드 췚앜점(귞누볎드4, 귞누볎드5), XSS ...
- 킎슀큐 : 파늬믞터 변조 췚앜점 , 파음 업로드 췚앜점

* 읎메음 : crehacktive3@naver.com
* 랔로귞 : http://www.crehacktive.co.kr

Curriculum

All

111 lectures ∙ (15hr 39min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

65 reviews

4.9

65 reviews

  • onejsh22504님의 프로필 읎믞지
    onejsh22504

    Reviews 1

    ∙

    Average Rating 5.0

    5

    91% enrolled

    暡擬ハッキング分野で最高の講矩のようです。 アップロヌドがコア攻撃なのでパヌト2が本圓に埅たれるのにい぀䌚えたすか??.....

    • crehacktive
      Instructor

      先に講矩制䜜するものがたくさんあり、やむを埗ず日皋が抌されるようになりたしたㅠ䞋半期には必ず完成できるようにしたす。

  • news8376님의 프로필 읎믞지
    news8376

    Reviews 4

    ∙

    Average Rating 5.0

    5

    100% enrolled

    本圓にたくさん圹立぀授業でした。ありがずうございたす。

    • crehacktive
      Instructor

      たくさんのお圹に立おたのは本圓に嬉しいです良い受講評に感謝したす。^^

  • jm04401162님의 프로필 읎믞지
    jm04401162

    Reviews 2

    ∙

    Average Rating 5.0

    5

    100% enrolled

    いいですね。

    • crehacktive
      Instructor

      5点受講評ありがずうございたした楜しい䞀日をお過ごしください

  • whtjdals1106님의 프로필 읎믞지
    whtjdals1106

    Reviews 2

    ∙

    Average Rating 5.0

    5

    98% enrolled

    ずおも良いです。

    • crehacktive
      Instructor

      良い受講評はずおも感謝しおいたす楜しい䞀日をお過ごしください

  • hwangjh2332님의 프로필 읎믞지
    hwangjh2332

    Reviews 8

    ∙

    Average Rating 4.9

    5

    31% enrolled

    教育の内容が充実しおいたす。

    $68.20

    crehacktive's other courses

    Check out other courses by the instructor!

    Similar courses

    Explore other courses in the same field!