OP 26 February, 2020 - 01:59 PM
(This post was last modified: 09 March, 2020 - 03:22 PM by Kirmada.)
During penetration testing engagements, You may have seen unrestricted File Upload
which can grant you access to the server to execute malicious codes, however, it’s not that
easy to do so in some cases where you have to bypass file upload restrictions and filtrations which
can make it a bit challenging to finally get the job done. This paper will discuss the methods of
how the web application handles this process and how it validates the files that are being sent to
the server and how to bypass these validations.
which can grant you access to the server to execute malicious codes, however, it’s not that
easy to do so in some cases where you have to bypass file upload restrictions and filtrations which
can make it a bit challenging to finally get the job done. This paper will discuss the methods of
how the web application handles this process and how it validates the files that are being sent to
the server and how to bypass these validations.