CTF Guide
search
⌘Ctrlk
My Socialschevron-downGithubchevron-down
CTF Guide
  • Introduction
  • Cryptography
    • Intro to Cryptography
    • Index of Coincidence
    • Solving Monoalphabetic Substitution Ciphers
    • Pig Latin
  • Web Exploitation
    • SQLi
    • File Upload Vulnerabilities
      • Content type restrictions
      • insufficient blacklisting
      • Obfuscating File Extensions
      • Unrestricted file uploads
  • Forensics
    • Introduction to Forensics
    • General
    • Steganography
    • Forensic Platforms
    • Conclusion
  • Page
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Web Exploitation

File Upload Vulnerabilities

Content type restrictionschevron-rightinsufficient blacklistingchevron-rightObfuscating File Extensionschevron-rightUnrestricted file uploadschevron-right

Last updated 1 year ago