-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Zed Attack Proxy Cookbook
By :
Many business processes in applications allow for the upload and modification of data supplied via uploaded files. The business process must examine the files and only accept specific authorized file types. The business logic is responsible for determining which files are authorized and whether they are application/system specific. In this recipe, we will attack an exploitable file upload option via profile avatar. Since certain file extensions are banned, the simple defense will be circumvented through traditional obfuscation techniques.
The user will upload a basic PHP web shell that will be used to exfiltrate the contents of a file secret in /home/carlos/ to complete the lab.
For this recipe, you will need to start PortSwigger’s Web shell upload via obfuscated file extension lab and ensure that ZAP is intercepting traffic between the lab application and your browser.