강의

멘토링

로드맵

BEST
Security & Network

/

Computer Security

Analysis of File Upload Vulnerability Attack Techniques and Practical Cases by a Simulated Hacking Practitioner: PART 1

The ultimate web hacking master! File upload vulnerability attack technique! This is a training that will further improve the students' web hacking skills through a completely different approach from the existing known methods!

(4.9) 67 reviews

804 learners

  • crehacktive
Penetration Testing

Reviews from Early Learners

What you will learn!

  • How the file upload function works

  • File upload vulnerability principle

  • Understanding web shells and how they work

  • File upload vulnerability attack methodology

  • File Upload Vulnerability Secure Coding Techniques

  • Practical attack techniques

📖 A series of file upload vulnerability attacks, explained by a simulated hacking expert!

  • PART (1): Basics / Practical Attacks / Secure CodingCurrent Course
    This training covers the most crucial aspect of file upload vulnerability attacks, detailing the attack process with a completely different approach from previously known methods. You'll learn the fundamentals of attack, practical bypass techniques, case studies, various countermeasures, and secure coding. This essential training serves as the foundation for subsequent courses.
  • PART (2): Advanced Attack Techniques / In-Depth Practical Analysis
    This training covers advanced attack techniques and Web Application Firewall bypass techniques not covered in PART (1), and analyzes technical techniques used in practical environments through hands-on practice.
  • SKILL-UP: Webshell Obfuscation Techniques
    In today's web environment, the use of web shell detection solutions is increasing, and accordingly, analysts must possess the skills to bypass them. Therefore, this training will be essential for practitioners.

📖 File upload vulnerability?! What the heck is this!?

File upload vulnerabilities are an attack technique that utilizes a malicious script called a WebShell to take control of a server. The attack doesn't stop at a single server, but can extend into the internal network . This is truly a devastating attack!

📖 Why should you learn about file upload vulnerability attacks?

File upload functionality is essential in today's web environment. Most of the websites we frequently use have file upload functionality! What if a web shell, a malicious script for attack, were uploaded through this feature?

Numerous malicious hackers (black hackers) use this attack technique to penetrate internally via compromised web servers, deploying malware to employees, distributing ransomware, stealing confidential internal information, and stealing personal customer information. This is a truly terrifying attack!

Because of this influence, many companies cannot help but be sensitive to " file upload vulnerabilities ," and it is an attack technique that has even earned the title of " the ultimate boss " among practitioners!

If you are doing web hacking yourself or defending yourself, you now know what you need to know, right? ㅡ.,ㅡ;;

📖 Why should I take this course?

Those of you reading this right now likely fall into the following categories:

  • Beginners who are just starting out with web hacking
  • Beginner/intermediate level students who have just started studying web hacking.
  • A job seeker who graduated from a security academy
  • A diagnostician (consultant) who is making a diagnosis in practice

I would like to say it in one sentence.

" It helps everyone. "

This is the most persistent attack that digs into the field during diagnosis, and it is my personal favorite.
I would like to share with you the know-how I have gained over the years.

📖 Through detailed attack principle analysis
Education that even beginners can easily access!

The training will be conducted from the basics, including the operating principles of the file upload function and the principles of file upload vulnerabilities.
We will go through each step in detail so that even beginners can easily understand.

📖 From the principle of web shell operation
Practice creating your own web shell!

We'll cover the basic concepts, operating principles, and hands-on practice of creating a "web shell," a key element in file upload vulnerability attacks. Understanding web shells is essential!

📖 SKILL-UP through practical case studies~!!!

Expand your practical perspective with 12 case studies, and make the skills your own by practicing in the provided virtual environment!

📖 Provides a virtual practice environment for hands-on training!

A total of 18 virtual practice environments are provided for JSP and PHP!

📖 Learn secure coding by following along!
Secure coding technology is also improving!

We often see diagnosticians being strong on offense but weak on defense. This stems from language barriers and a lack of understanding of secure coding. Practice can help you overcome these barriers!

📖 Expected effects through education

  • A conceptual shift in file upload vulnerabilities
  • Correct Attack Guidelines
  • Improve your skills through a new perspective
  • Learn not only offensive skills but also defensive skills!

🛠 Programs covered here

  • Burp Suite
  • APMSetup
  • Tomcat

※ How to use Burp Suite is not covered in this training. You can refer to the basic usage method in the training "Stories about Web Hacking and Simulated Hacking in the Field."

💡 Must-see lectures

Web Technology Fundamentals You Must Know
A course to learn the basics of web technology
A story about web hacking and simulated hacking in the field.
Beginner's Guide to Learning Web Hacking

※ This training PPT uses Nanum font provided by Naver.

Recommended for
these people

Who is this course right for?

  • For everyone from beginners to advanced web hackers.

  • hands-on worker

  • For those who want to know more about file upload vulnerability attack techniques

Need to know before starting?

  • Web Basics

  • Web Hacking Basics

Hello
This is

26,082

Learners

1,381

Reviews

501

Answers

4.9

Rating

18

Courses

안녕하세요, 크리핵티브입니다.

다년간 다양한 웹 서비스를 진단하고 연구한 경험을 바탕으로, 실무에 바로 적용 가능한 지식을 인프런 플랫폼에서 공유해오고 있습니다.

그리고 웹 해킹 기초를 체계적으로 다룬 크리핵티브의 한 권으로 끝내는 웹 해킹 바이블집필했습니다. 기초가 부족한 분들께는 이 책으로 학습을 시작하실 것을 권합니다.

 

Curriculum

All

111 lectures ∙ (15hr 39min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

67 reviews

4.9

67 reviews

  • Dantejsh님의 프로필 이미지
    Dantejsh

    Reviews 1

    Average Rating 5.0

    5

    91% enrolled

    모의해킹분야 최고의 강의인것같습니다. 업로드가 핵심 공격이라 파트2가 정말 기다려지는데 언제 만나볼수있을까요??.....

    • 크리핵티브
      Instructor

      앞서 강의 제작할 것들이 많이 있어서 어쩔 수 없이 일정이 밀리게 되었습니다ㅠ 하반기에는 꼭 완성될 수 있도록 하겠습니다.

  • 에스지시큐리티컨설팅님의 프로필 이미지
    에스지시큐리티컨설팅

    Reviews 4

    Average Rating 5.0

    5

    100% enrolled

    정말 많이 도움되는 수업들이었습니다. 감사합니다.

    • 크리핵티브
      Instructor

      많은 도움이 되셨다니 정말 다행입니다! 좋은 수강평 너무 감사합니다.^^

  • jm0440님의 프로필 이미지
    jm0440

    Reviews 2

    Average Rating 5.0

    5

    100% enrolled

    좋습니다.

    • 크리핵티브
      Instructor

      5점 수강평! 너무 감사합니다! 즐거운 하루 보내세요~!

  • whtjdals님의 프로필 이미지
    whtjdals

    Reviews 2

    Average Rating 5.0

    5

    98% enrolled

    너무너무 좋아요

    • 크리핵티브
      Instructor

      좋은 수강평 너무너무 감사합니다! 즐거운 하루 보내세요~!

  • hwang_jh님의 프로필 이미지
    hwang_jh

    Reviews 8

    Average Rating 4.9

    5

    31% enrolled

    교육의 내용이 충실합니다

    Limited time deal

    $66,000.00

    25%

    $68.20

    crehacktive's other courses

    Check out other courses by the instructor!

    Similar courses

    Explore other courses in the same field!