Update README.md

Added "adding magic bytes" solution
This commit is contained in:
vict0ni 2020-05-14 00:09:30 +02:00 committed by GitHub
parent eb074393df
commit 7b8514f1f5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -65,6 +65,8 @@ Coldfusion: .cfm, .cfml, .cfc, .dbm
* `Content-Type : image/gif`
* `Content-Type : image/png`
* `Content-Type : image/jpeg`
- [Magic Bytes](https://en.wikipedia.org/wiki/List_of_file_signatures)
Sometimes applications identify file types based on their first signature bytes. Adding/replacing them in a file might trick the application.
### Picture upload with LFI
@ -95,4 +97,4 @@ Touch command
* [BookFresh Tricky File Upload Bypass to RCE, NOV 29, 2014 - AHMED ABOUL-ELA](https://secgeek.net/bookfresh-vulnerability/)
* [Encoding Web Shells in PNG IDAT chunks, 04-06-2012, phil](https://www.idontplaydarts.com/2012/06/encoding-web-shells-in-png-idat-chunks/)
* [La PNG qui se prenait pour du PHP, 23 février 2014](https://phil242.wordpress.com/2014/02/23/la-png-qui-se-prenait-pour-du-php/)
* [File Upload restrictions bypass - Haboob Team](https://www.exploit-db.com/docs/english/45074-file-upload-restrictions-bypass.pdf)
* [File Upload restrictions bypass - Haboob Team](https://www.exploit-db.com/docs/english/45074-file-upload-restrictions-bypass.pdf)