From 7a68102a3cefdaa57802f8db868a4cf151d19a2b Mon Sep 17 00:00:00 2001 From: Jonathan Thompson Date: Sat, 4 May 2024 11:12:54 -0700 Subject: [PATCH] Fix link to SecLists/content-type.txt --- Upload Insecure Files/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/Upload Insecure Files/README.md b/Upload Insecure Files/README.md index d5c58fe..e0de921 100644 --- a/Upload Insecure Files/README.md +++ b/Upload Insecure Files/README.md @@ -87,7 +87,7 @@ * `Content-Type : image/gif` * `Content-Type : image/png` * `Content-Type : image/jpeg` - * Content-Type wordlist: [SecLists/content-type.txt](https://github.com/danielmiessler/SecLists/blob/master/Miscellaneous/web/content-type.txt) + * Content-Type wordlist: [SecLists/content-type.txt](https://github.com/danielmiessler/SecLists/blob/master/Miscellaneous/Web/content-type.txt) * Set the Content-Type twice: once for unallowed type and once for allowed. - [Magic Bytes](https://en.wikipedia.org/wiki/List_of_file_signatures) * Sometimes applications identify file types based on their first signature bytes. Adding/replacing them in a file might trick the application. @@ -219,4 +219,4 @@ Upload the XML file to `$JETTY_BASE/webapps/` * [Jetty Features for Hacking Web Apps - September 15, 2022 - Mikhail Klyuchnikov](https://swarm.ptsecurity.com/jetty-features-for-hacking-web-apps/) * [Inyección de código en imágenes subidas y tratadas con PHP-GD - Spanish Resource - hackplayers](https://www.hackplayers.com/2020/03/inyeccion-de-codigo-en-imagenes-php-gd.html) * [A New Vector For “Dirty” Arbitrary File Write to RCE - Doyensec - Maxence Schmitt and Lorenzo Stella](https://blog.doyensec.com/2023/02/28/new-vector-for-dirty-arbitrary-file-write-2-rce.html) -* [PHP Internals Book - THE .PHPT FILE STRUCTURE](https://www.phpinternalsbook.com/tests/phpt_file_structure.html) \ No newline at end of file +* [PHP Internals Book - THE .PHPT FILE STRUCTURE](https://www.phpinternalsbook.com/tests/phpt_file_structure.html)