Screenshots from the blog posts
Summary
In this post, we will perform the source code review of an open-source PHP application to detect an exploit of an arbitrary file upload vulnerability, eventually gaining a reverse shell on the target. We will conclude the analysis by checking the patches and making sense of them.
Description
Tags
Comments (0)