- #100DaysOfHacking with πNotes (included in the end).
- Day - 3
- 1. Users and Privileges. β¬
~# ls -la
List for checking permissions β¬
`d` - directory
`-` - file
`rwx`
r w x
read write execute
rwxr-xr-x
-------------------------
3 groups are here 1- `rwx` 2- `r-x` 3- `r-w`
1. d`rwx`r-xr-x - Owner of the file
All permissions are there.
This permissions setting that a particular group has
In this case can do read, write and execute.
2. drwx`r-x`r-x - Member of the group
The next set of three here is actually the permissions for the members of the group that own the file
In this case, can do only read and execute.
3. drwxr-x`r-x` - For all the users on the machine
In this case, we have read and execute permissions.
/tmp - dir is having all permissions
While hacking, we might actually upload it into the temp folder because that's where we can execute those files
Risky Functionality - File Uploads:
- Test that acceptable file types are whitelisted
- Test that file size limits, upload frequency and total file counts are defined and are enforced
- Test that file contents match the defined file type
- Test that all file uploads have Anti-Virus scanning in-place.
- Test that unsafe filenames are sanitised
- Test that uploaded files are not directly accessible within the web root
- Test that uploaded files are not served on the same hostname/port
- Test that files and other media are integrated with the authentication and authorisation schemas
Golden Tips + Resources To get Job/Internships + For self Development
Only these Best Resources you need to start π
Opensource, Web Development, Programming, DevOps and all Cyber Security Resources Included β¬
π§΅π₯
[ Open-source ]
Open Source Plays Important role in Self Development + in Job/Internships resume.