how hackers bypass file upload restrictions!

preview_player
Показать описание
// Membership //

// Courses //

// Books //

// Social Links //

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Рекомендации по теме
Комментарии
Автор

An even better approach is to upload the target file with docx.pdf and then change the content type to application/docx and filename during the interception by burp suite. This would improve precision in the upload process.

LoiLiangYang
Автор

Awesome line "i am fixing the website" lol

alexjr
Автор

This method seems more efficient than exporting to PDF. I might adopt it.

wingsdesire
Автор

Finally I can send my homework on a different file format

torrikusu
Автор

Any developer worth his salt will check the file that's been uploaded instead of blindly accepting whatever the network sends.

mikefromwa
Автор

Yeah! Just click the file and open it in print ---> save file as required format(PDF, zip,

Btw, nice tutorial we can try it when we don't want to get ourselves a job😁😂

gauravdabholkar
Автор

I wonder if I'm able to upload a resume in different format, would it stand out to the recruiter? awesome tutorial btw

lesliezhou
Автор

Other methods:
1. Zip the docx file.
2. Export as pdf.

harrisonproductions
Автор

To the people saying he could’ve just exported the docx file to pdf. In here he’s not showing how to bypass it for the purpose of uploading your stuff, what this video basically means is that if a website is restricting you from uploading for example a php reverse shell, then you can do this exact method to get around that and bypass the file extension


Cheers everybody

younesmohssen
Автор

This is quite useful if you know where the server uploads the files, and if it renames them or not. Once you know that, you can get a reverse shell by uploading say a php shell, or a simple webshell if file size is limited. Access the file in your browser and the web app will run the payload, giving you a shell on netcat. Assuming you did it all correctly anyways.

Skullkid
Автор

In a real website I would hope that the serverside does checks, but the content-length was unchanged also. So the upload would hang waiting for the rest of the content.

pqsk
Автор

Much faster than adding the file to a .zip folder :)

marsilkri
Автор

Mr. Loi - Hacking is illegal
My Mind- Let's try this on realtime websites

pranaybwm
Автор

doesn't the server will check the file type again and send an error message ?

ilyasayusuf
Автор

Where's the disclaimer that this will only work if there's no server side validation in place for file types?

coltzi
Автор

How can we hide payloads in a image file like php payloads for reverse shell connection from a social media website

nagarathnagopal
Автор

This will work fine if the file check security is coded on the front-end, but as a developer I would never trust the front-end for that. My Web service would refuse that request and probably try to log your IP address as well. In all honesty, if that is coded on the front end there's an easier way to get around it, just modify the client-side code. No need for an interceptor in that case. For that matter, use Postman if you already have the endpoint.

budove
Автор

Teacher: Where is your homework???
Me: Ahh its the exe file
Teacher: haha *how*

kenan
Автор

i just love this man "i am fixing website " (:

smokyskullgaming
Автор

Pretty nice tutorial, Loiliangyang is the best !

blablabla