6 Videos for API to Shell

PRO
Tier
Hard
Hard
3517 completed
Return to Exercise
image of exercise API TO SHELL: Introduction

This video requires PentesterLab PRO

GO PRO
API TO SHELL: Introduction

In this video, we explore the functionalities of the Api to Shell application, including actions like Register, Login, List of files, Retrieve a file, and Upload a file. We also demonstrate how to use curl with an HTTP proxy and Burp to interact with the API.

video duration icon03:23 number of views icon8325

 

image of exercise PHP comparisons

This video requires PentesterLab PRO

GO PRO
PHP comparisons

In this video, we delve into the differences between strict and loose comparisons in PHP. You'll learn how these comparison methods can yield different results when comparing integers and strings, and why understanding this distinction is crucial for secure coding.

video duration icon02:04 number of views icon5850

 

image of exercise Signature bypass

This video requires PentesterLab PRO

GO PRO
Signature bypass

In this module, we explore how to bypass digital signature checks by exploiting loose comparison vulnerabilities in web applications. We'll demonstrate how to manipulate request parameters to retrieve arbitrary files from the server.

video duration icon05:43 number of views icon6592

 

image of exercise Recovering the source code

This video requires PentesterLab PRO

GO PRO
Recovering the source code

In this video, we explore how to recover the source code of an application to perform a security audit and identify vulnerabilities. By retrieving and analyzing key files, we aim to achieve code execution on the server.

video duration icon05:39 number of views icon6855

 

image of exercise Code review

This video requires PentesterLab PRO

GO PRO
Code review

In this video, we delve into the process of conducting a code review on a PHP application. We uncover various aspects of the application's authentication mechanism, specifically focusing on tokenization and serialization vulnerabilities.

video duration icon07:11 number of views icon6163

 

image of exercise Exploitation of unserialize

This video requires PentesterLab PRO

GO PRO
Spoiler
Exploitation of unserialize

In this video, we explore the exploitation of PHP's unserialize function. By sending a malicious serialized object, we can create a file with arbitrary content on the server, leading to potential code execution.

video duration icon08:31 number of views icon8068