tbhm:07_file_upload
Differences
This shows you the differences between two versions of the page.
| tbhm:07_file_upload [2026/05/14 09:18] – TBHM import drew | tbhm:07_file_upload [2026/05/14 09:28] (current) – converted from markdown to dokuwiki syntax drew | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | # Tactical Fuzzing - FI & Uploads | + | ====== |
| - | ## Local file inclusion | + | ===== Local file inclusion |
| Core Idea: Does it (or can it) interact with the server file system? | Core Idea: Does it (or can it) interact with the server file system? | ||
| Line 7: | Line 7: | ||
| [[https:// | [[https:// | ||
| - | ## Malicious File Upload | + | ===== Malicious File Upload |
| This is an important and common attack vector in this type of testing. | This is an important and common attack vector in this type of testing. | ||
| - | A file upload | + | A file upload |
| Attacks: | Attacks: | ||
| - | - Upload unexpected file format to achieve code exec (swf, html, php, php3, aspx, ++) Web shells or... | + | * Upload unexpected file format to achieve code exec (swf, html, php, php3, aspx, ++) Web shells or... |
| - | - Execute XSS via same types of files. Images as well! | + | |
| - | - Attack the parser to DoS the site or XSS via storing payloads in metadata or file header | + | |
| - | - Bypass security zones and store malware on target site via file polyglots | + | |
| File upload attacks are a whole presentation. Try this one to get a feel for bypass techniques: | File upload attacks are a whole presentation. Try this one to get a feel for bypass techniques: | ||
| - | - content type spoofing | + | * content type spoofing |
| - | - extension trickery | + | |
| - | - [[https:// | + | |
| - | As referenced, file polyglots can be used to store malware on servers! | + | As referenced file polyglots can be used to store malware on servers! |
| - | [[http:// | + | [[http:// |
| + | [[http:// | ||
| - | ## Remote file includes and redirects | + | ===== Remote file includes and redirects |
| Look for any param with another web address in it. Same params from LFI can present here too. | Look for any param with another web address in it. Same params from LFI can present here too. | ||
| Common blacklist bypasses: | Common blacklist bypasses: | ||
| - | - escape "/" | + | * escape "/" |
| - | - try single "/" | + | |
| - | - remove http i.e. " | + | |
| - | - "/ | + | |
| - | - encode, slashes | + | |
| - | - " | + | |
| - | - " | + | |
| - | - "/" | + | |
| Redirections Common Parameters or Injection points: | Redirections Common Parameters or Injection points: | ||
| - | - dest= | + | * dest= |
| - | - continue= | + | |
| - | - redirect= | + | |
| - | - url= (or anything with " | + | |
| - | - uri= (same as above) | + | |
| - | - window= | + | |
| - | - next= | + | |
| RFI Common Parameters or Injection points: | RFI Common Parameters or Injection points: | ||
| - | - File= | + | * File= |
| - | - document= | + | |
| - | - Folder= | + | |
| - | - root= | + | |
| - | - Path= | + | |
| - | - pg= | + | |
| - | - style= | + | |
| - | - pdf= | + | |
| - | - template= | + | |
| - | - php_path= | + | |
| - | - doc= | + | |
tbhm/07_file_upload.1778746728.txt.gz · Last modified: by drew
