Room progress ( 0% )
Task 1Getting Started
Task includes a deployable machine
Task 2Introduction
Task 3General Methodology
Task 4Overwriting Existing Files
Task 5Remote Code Execution
Task 6Filtering
Task 7Bypassing Client-Side Filtering
Task 8Bypassing Server-Side Filtering: File Extensions
Task 9Bypassing Server-Side Filtering: Magic Numbers
Task 10Example Methodology
Task 11Challenge [Optional]
Task includes a downloadable file
Task 12Conclusion
Created by
Room Type
Only subscribers can deploy virtual machines in this room! Go to your profile page to subscribe (if you have not already).
Users in Room
88,535
Created
1803 days ago
Ready to learn Cyber Security? Create your free account today!
The Upload Vulnerabilities room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in