How we Deface , shell & image upload vulnerability

Deface, Shell & Image Upload Vulnerability

This vulnerability can be used to upload your deface,shell or image on a website.
Google Dorks:inurl:”default_image.asp”
inurl:”default_imagen.asp”
inurl:”/box_image.htm”
 You will get tons of website there. Select any website of your choice, you will get a upload option. Choose your deface, shell or image and click on upload. After the uploading process completes. In the box where all uploaded files are listed, search for the name of your uploaded file. Click on select, under the box you will get the URL of your uploaded file. Add it after the URL of the website (Remember to remove the extra stuff in the URL)
BY HaRis
How we Deface , shell & image upload vulnerability How we Deface , shell & image upload vulnerability Reviewed by Don't Play on 12:33:00 Rating: 5

3 comments:

'; (function() { var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true; dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js'; (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq); })();
Powered by Blogger.