Web Shell via Polyglot File Upload!

  Рет қаралды 18,513

Intigriti

Intigriti

Күн бұрын

Пікірлер: 36
@khushmanvar9038
@khushmanvar9038 2 жыл бұрын
Ohh, what a technique man! Thanks intigriti 🤩
@intigriti
@intigriti 2 жыл бұрын
Glad you like it! Try it out and let us know if you had success with it 💪
@asaad0x
@asaad0x 2 жыл бұрын
I have said before on another video i guess .. but u look things looks so easy and simple even though they are not 😁❤️ everytime i watch your videos i think like wow how i didn't get that idea .. learned a new usage of exiftool today from you . thank you so much for the amazing content ❤️❤️
@intigriti
@intigriti 2 жыл бұрын
Thanks so much 😊 We really appreciate your nice words 😍 Keep learning!!
@khaledselim9835
@khaledselim9835 2 жыл бұрын
b3d el klmten dol mfesh mnak amal brdo 3iel ga7sh :D
@hybridsh4d0w
@hybridsh4d0w 2 жыл бұрын
love the qualitiy of your burpsuite content - my sub is here :)
@intigriti
@intigriti 2 жыл бұрын
Awesome, thank you! We are glad to have you around! 😇
@costycrypto5010
@costycrypto5010 Жыл бұрын
Thanks for your effort!
@intigriti
@intigriti Жыл бұрын
🙏🥰
@vilislacis3337
@vilislacis3337 Жыл бұрын
I had trouble with EXIFTOOL, it would complain if there was anything inside . Instead I edited metadata via Windows Explorer > Right click > Details > Title. After I ran uploaded file, the output looked garbled, but inside it there was a 32 string, which is the same length as the codes in previous labs. I tried it and the code was accepted!
@intigriti
@intigriti Жыл бұрын
Nice! exiftool should work as well, maybe try to wrap the payload in single quotes next time, if you didn't already 🤔
@eduardprivat9821
@eduardprivat9821 6 ай бұрын
but for better understanding: it is not possible to let the OS execute that comment in the image.png file if we say that the comment is a compiled c binary who do the same as that php file_gets_content function does?
@eforever27
@eforever27 15 күн бұрын
Thanks.
@intigriti
@intigriti 15 күн бұрын
Welcome! 💜
@dizonnicolefranza.4181
@dizonnicolefranza.4181 2 жыл бұрын
can you make a video about API thank you
@ulrikmagana
@ulrikmagana 2 жыл бұрын
Thank you for making such an informative video. I keep having this error on my cmd Error: Error creating file: C:/example.png_exiftool_tmp - C:/example.png 0 image files updated 1 files weren't updated due to errors what could be a good way to fix it?
@intigriti
@intigriti 2 жыл бұрын
What is the command that you run?
@njay5774
@njay5774 2 жыл бұрын
You're trying to upload the file from a secure directory such as the windows, C:, or a root directory on your pc. To fix this , I suggest running command prompt as an administrator or running the command for another sub-directory like C:\Users\\Pictures. It will definitely work.
@novanuke1356
@novanuke1356 2 жыл бұрын
I was running into a similar issue. the output file name already existed
@ponyride23
@ponyride23 2 жыл бұрын
My php's MIME type is HTML in Burp Suite, but exiftool shows MIME type as image/png.... what am I doing wrong? :(
@intigriti
@intigriti 2 жыл бұрын
Can you share the mm:ss timemark where you are having troubles? Are you following the exact steps we were taking?
@homeboydog
@homeboydog 2 жыл бұрын
The issue if you're using burp suite community the free edition is that you are using a PNG file in the first place, save an image as jpg and then go through this process with that. This is due to burp's proxy running on Chromium. Took me many hours to get to this point lol
@henrycharriere
@henrycharriere 2 жыл бұрын
Nice video!! if a put um reserve shell, its work? tks...
@intigriti
@intigriti 2 жыл бұрын
thanks 💪
@jaitavyamishra8138
@jaitavyamishra8138 5 ай бұрын
do i need to install exiftool for it's a command any one can help me
@intigriti
@intigriti 5 ай бұрын
If you are using an OS like Kali Linux it is probably pre-installed. Otherwise, try and run "sudo apt-get install exiftool"
@SuperTechrobin
@SuperTechrobin 2 жыл бұрын
Nice video
@intigriti
@intigriti 2 жыл бұрын
Thanks 💪
@ravi.dissanayake
@ravi.dissanayake 2 жыл бұрын
😍
@intigriti
@intigriti 2 жыл бұрын
Thank you very much ❤️
@rahiislam3636
@rahiislam3636 2 жыл бұрын
😊😊
@intigriti
@intigriti 2 жыл бұрын
😇 Thanks for watching!
@MikelLabouf
@MikelLabouf Жыл бұрын
This example doesn't work in real world applications, it only works on your script kiddy testing platforms, the first thing that real world apps process is the file extension, if the file extension is blacklisted, it won't work, if you change the file extension through burp proxy from php to jpg, the code will be uploaded but not executed.
@intigriti
@intigriti Жыл бұрын
It is indeed rarely seen nowadays, but was a very common vulnerability 10+ years ago. It's still worth testing for it as it comes with no effort and might still work in some apps.
@nishantdalvi9470
@nishantdalvi9470 10 ай бұрын
Daam ...! this comment lowered my motivation and willingness to explore further labs : (
Web Shell Upload via Content-Type Restriction Bypass
11:30
Intigriti
Рет қаралды 18 М.
Web Shell via Denylist Bypass!
9:05
Intigriti
Рет қаралды 20 М.
Random Emoji Beatbox Challenge #beatbox #tiktok
00:47
BeatboxJCOP
Рет қаралды 63 МЛН
The IMPOSSIBLE Puzzle..
00:55
Stokes Twins
Рет қаралды 118 МЛН
How To Search For DOM-Based XSS!
9:37
Intigriti
Рет қаралды 50 М.
How File Upload Vulnerabilities Work!
7:20
Intigriti
Рет қаралды 46 М.
Web Shell Upload via Path Traversal
7:28
Intigriti
Рет қаралды 11 М.
Web Shell Upload via Obfuscated File Extension
8:10
Intigriti
Рет қаралды 8 М.
Clickjacking chained with DOM-Based XSS!
8:36
Intigriti
Рет қаралды 10 М.
Accessing Private GraphQL Posts
6:47
Intigriti
Рет қаралды 3,8 М.
LFI to RCE? - Archangel by @RealTryHackMe
14:13
Intigriti
Рет қаралды 6 М.