File Upload, Code Execution, and File Inclusion Vulnerabilities

This chapter will talk about different vulnerabilities and will explain how to perform them on the Metasploitable machine. A detailed illustration of the each of the scenarios will be covered. At the end of every section, we will also see a quick solution to each vulnerability explained.

The chapter will cover the following topics:

  • File upload vulnerabilities
  • Code execution vulnerabilities
  • Local file inclusion vulnerabilities
  • Basic mitigation
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.244.201