강의

멘토링

커뮤니티

Security & Network

/

Computer Security

File Upload Vulnerability Advanced Attack Techniques PART2 [Integrated Edition]

The ultimate web hacking! File upload vulnerability attack technique! Part 2 of the 'Part 1' education follows Part 1 and covers more advanced techniques.

(4.9) 7 reviews

112 learners

  • crehacktive
해킹
모의해킹
Penetration Testing
Java
Web Shell
Offensive Security

What you will learn!

  • Understanding the Java File Upload Library

  • Potential security threat to Java file upload library

  • Understanding Web Firewalls

  • Web Firewall Bypass Technology

  • Understanding different environments

  • Webshell Upload Attack Methods in Various Environments

💡 Please check before taking the class!

  • This course is part 2 of the "Advanced File Upload Vulnerability Attack Techniques" (Part 2-1 + Part 2-2 + Part 2-3) course. If you'd like to take the course in separate sections, please refer to the course introductions for [PART2-1] / [PART2-2] / [PART2-3] !

Something you can't hear anywhere else
I included it in the lecture!

There are many avenues for learning web hacking today. Whether it's online courses like Inflearn, offline academies, or search engines, most of the common avenues tend to focus on general information. However, this course is different. We pride ourselves on offering content you won't find anywhere else !

File Upload Vulnerability Attack Part 2-1
Check out the learning content!

Upload verification logic is known to be safe, but is it really safe?

The source code below is known to be safe from file upload vulnerabilities. So, is it really safe?

... String path = request.getRealPath( "/upload" ); MultipartRequest multi = new MultipartRequest (request, path, 1024 * 10 * 10 , "UTF-8" ); Enumeration formNames = multi.getFileNames(); while (formNames.hasMoreElements()) { String param = (String)formNames.nextElement(); String uploadFile = multi.getFilesystemName(param); int extOffset = uploadFile.lastIndexOf( "." ); String fileExt = uploadFile.substring(extOffset+ 1 ).toLowerCase(); if (!fileExt.equals( "jpg" ) && !fileExt.equals( "png" ) && !fileExt.equals( "gif" )) { File fp = new File (path, uploadFile); fp.delete(); out.println(“ <script>alert(‘잘못된 확장자’);history.back(-1);</script> "); return; } } ...

No, the source code is 'vulnerable' .
Why this code is vulnerable and how to exploit it are covered in detail in Part 2-1 of the lecture.

Want to know more? 📚

Understanding Cases by File Upload Library

We analyze each file upload library, covering potential security threats and various case scenarios.

Methodology and Practice Based on Security Threats

We explore potential security threats and practice attacks for a variety of scenarios.

File Upload Vulnerability Attack Part 2-2
Check out the learning content!

Web Firewall Bypass Techniques Case Study

Learn about various web firewall bypass techniques and practice using these attack techniques.

File Upload Vulnerability Attack Part 2-3
Check out the learning content!

This article details the directory parsing vulnerability found in JEUS and WebSphere, examining why it poses a threat today and the attack methodology behind it. (IBM WebSphere CVE-2020-4163)

Let's take a closer look at various other environments and cases.

This is not a lecture that tells you the correct answer.
This is a lecture that will broaden your perspective!

"File Upload Vulnerabilities Part 2" consists of three lectures designed to successfully exploit file upload vulnerabilities in various environments. However, this lecture does not provide the answers. Taking this course does not guarantee successful file upload vulnerability exploits in all environments.

The goal of this lecture isn't to provide the right answers, but to broaden your perspective . By learning about how vulnerabilities can arise in various environments, you'll gain the insight, "Oh, I can try this too!" Furthermore, you'll be able to analyze future assessments knowing that various environments exist. Analyzing with this understanding is a world of difference.

I hope this course will give you a solid perspective on web hacking and lay the foundation for taking your skills to the next level!

Expected Questions Q&A 💬

Q. Is there anything I should know before taking the course?

You must have an understanding of 'file upload vulnerabilities'. Additionally, If you're familiar with the material covered in Part 1 , you'll likely be able to take Part 2 smoothly. Of course, those with a strong understanding of "file upload vulnerabilities" should have no trouble taking the course.

Q. Who is eligible to take the course?

We recommend this course to those with practical experience. Those with a solid understanding of web hacking theory or job seekers can also take the course.

Q. Do I have to take 'File Upload Vulnerability Attack Part 1' ?

I highly recommend taking this course. Even if you understand file upload vulnerabilities, if you don't understand Part 1, you may find some parts of Part 2 unclear. Therefore, even if you're a professional, I recommend taking Part 1 first before taking Part 2.

Q. Part 2 is divided into three parts. Do I have to take them all?

You don't have to take all three courses. However, if you want to learn attack methodologies for a variety of practical environments, I highly recommend taking all three.

Q. Should I take Part 2 in the order of Part 3?

You don't have to do this; you can take the courses you want first. However, since the three lectures were produced sequentially, we recommend taking them sequentially for better flow.

Things to note before taking the course 📢

We recommend taking this course with a basic understanding of web technologies and web hacking. We also recommend taking "File Download Vulnerability Exploitation" and "File Upload Vulnerability Exploitation Part 1" from Creative's web hacking lecture series.

Recommended for
these people

Who is this course right for?

  • Practitioners who perform simulated hacking or vulnerability diagnostics in the field

  • job seeker

Need to know before starting?

  • web technology

  • Web Hacking Basics

  • File Download Vulnerability Knowledge

  • File Upload Vulnerability Knowledge

Hello
This is

26,251

Learners

1,398

Reviews

502

Answers

4.9

Rating

18

Courses

안녕하세요, 크리핵티브입니다.

다년간 다양한 웹 서비스를 진단하고 연구한 경험을 바탕으로, 실무에 바로 적용 가능한 지식을 인프런 플랫폼에서 공유해오고 있습니다.

그리고 웹 해킹 기초를 체계적으로 다룬 크리핵티브의 한 권으로 끝내는 웹 해킹 바이블집필했습니다. 기초가 부족한 분들께는 이 책으로 학습을 시작하실 것을 권합니다.

 

Curriculum

All

72 lectures ∙ (6hr 10min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

7 reviews

4.9

7 reviews

  • hskim0001님의 프로필 이미지
    hskim0001

    Reviews 4

    Average Rating 5.0

    5

    31% enrolled

    • sonasup3719님의 프로필 이미지
      sonasup3719

      Reviews 7

      Average Rating 4.3

      4

      31% enrolled

      • sj331님의 프로필 이미지
        sj331

        Reviews 3

        Average Rating 5.0

        5

        31% enrolled

        • jeonghyeonjang6559님의 프로필 이미지
          jeonghyeonjang6559

          Reviews 3

          Average Rating 5.0

          5

          61% enrolled

          • hopefordream님의 프로필 이미지
            hopefordream

            Reviews 17

            Average Rating 4.8

            5

            100% enrolled

            良い講義でした〜

            $84.70

            crehacktive's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!