Tech Insights Blog

MediumWeb Security

Overview

Welcome to our Tech Insights Blog — a place where you can openly share your technology thoughts. Feel free to express your ideas with us, but make them clear and easy to understand so the audience doesn’t get confused, because the result of the confusions won’t be good.
Flag Format: Flag{}

Lab Details

Prerequisites & Requirements

  • Basic understanding of web application vulnerabilities
  • Familiarity with HTTP requests and responses
  • Knowledge of Apache web server configuration
  • Basic PHP understanding

What will you learn?

  • Apache configuration exploitation techniques
  • Understanding RewriteRule vulnerabilities
  • Filename confusion attacks in Apache
  • DocumentRoot confusion exploitation
  • SQLite database file injection
  • Bypassing file type restrictions
  • Remote Code Execution through configuration flaws

Tools

  • Web Browser
  • IDE
  • Burp Suite

Job Positions

Penetration Tester

Tags

Confusion AttacksSource Code ReviewRceServer MisconfigurationDirectory Traversal