Which of the following techniques has Richard implemented to upload the PHP shell?

Posted by: Pdfprep Category: ECSAv10 Tags: , ,

Richard, a penetration tester was asked to assess a web application. During the assessment, he discovered a file upload field where users can upload their profile pictures. While scanning the page for vulnerabilities, Richard found a file upload exploit on the website. Richard wants to test the web application by uploading a malicious PHP shell, but the web page denied the file upload. Trying to get around the security, Richard added the ‘jpg’ extension to the end of the file. The new file name ended with ‘.php.jpg’. He then used the Burp suite tool and removed the ‘jpg’’ extension from the request while uploading the file. This enabled him to successfully upload the PHP shell.

Which of the following techniques has Richard implemented to upload the PHP shell?
A . Session stealing
B . Cookie tampering
C . Cross site scripting
D . Parameter tampering

Answer: D

Leave a Reply

Your email address will not be published.