Room progress ( NaN% )
Task 1Getting Started
Task includes a deployable machine
Task 2Introduction
Task 3General Methodology
Task 4Overwriting Existing Files
Task 5Remote Code Execution
Task 6Filtering
Task 7Bypassing Client-Side Filtering
Task 8Bypassing Server-Side Filtering: File Extensions
Task 9Bypassing Server-Side Filtering: Magic Numbers
Task 10Example Methodology
Task 11Challenge [Optional]
Task includes a downloadable file
Task 12Conclusion
Ready to learn Cyber Security? Create your free account today!
The Upload Vulnerabilities room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in