Summary

  • The writer has been developing a Python programme that can go from zero to hero and carry out proof of concept exploits.
  • As part of this work, they have created a basic PHP website with vulnerabilities.
  • This asks users to upload an URL which is then saved in a temporary folder that is accessible via the webserver, creating a situation where an insecure file upload could lead to remote code execution.
  • The article explains how to create a proof of concept exploit for this website,Standalone proof of concept exploit for a fictitious web shell upload vulnerability., A regular workflow for developing a proof of concept usually involves: , - Creating a web server to host the payload, - Setting up instrumentation to gather basic statistics,, - Testing the payload and instrumentation using a test dataset.
  • Note that the article is for educational purposes only and should only be used for legal penetration testing and red teaming where permission has been granted.

By Pampuna

Original Article