ICT: Diary
D: 28 W: 05
| < | June 2020 | > | ||||
| Sun | Mon | Tue | Wed | Thu | Fri | Sat |
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | |
| 7 | 8 | 9 | 10 | 11 | 12 | 13 |
| 14 | 15 | 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 | 26 | 27 |
| 28 | 29 | 30 | ||||
[ < ]
Monday, 15 June 2020 [ >
]
Immersive Labs
Using curl and xxd when doing Immersive Labs on file bypass.
curl command was:
curl -i -X POST -H "Content-Type: multipart/form-data" \
-H "Content-Type: plain/text" \
-F "fileToUpload=@shell.php" \
http://10.102.6.149/upload.php
Tried using 0x0d:'\r' and 0x0a:'\n' in file names but it did work against the target.
Using xxd to inject jpeg magic numbers worked for uploading the php file - the target wouldn't then execute them…
Also had fun playing with GET parameters in the previous labs, with URL's like:
http://10.102.5.149/?post=LINK
$Id: dates.htm,v 1
$Id: diary,v 1.38 2025/01/01 22:43:54 fred Exp $