{"id":17468,"date":"2021-08-13T20:32:09","date_gmt":"2021-08-13T15:02:09","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=15723"},"modified":"2021-08-13T20:32:09","modified_gmt":"2021-08-13T15:02:09","slug":"php-jpeg-injector","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/","title":{"rendered":"Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images"},"content":{"rendered":"\n<p><strong>Php-Jpeg-Injector<\/strong> Injects php payloads into jpeg images. Related to&nbsp;this post.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Exploiting PHP-GD Image Create From jpeg() Function<\/strong><\/p>\n\n\n\n<p>Proof-of-concept to exploit the flaw in the PHP-GD built-in function, image create from jpeg(). Inspired by one of Reddit&#8217;s comment on my previous thread regarding exploiting the image create from gif() PHP-GD function.<\/p>\n\n\n\n<h6 class=\"has-luminous-vivid-amber-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/fakhrizulkifli\/Defeating-PHP-GD-imagecreatefromjpeg#warning-this-poc-was-tested-using-libjpeg-v80-only-the-image-requires-the-same-libjpeg-version-in-order-to-be-able-to-execute-the-php-code\"><\/a>Warning: This POC was tested using libJPEG v8.0 only. The image requires the same libJPEG version in order to be able to execute the PHP code.<\/h6>\n\n\n\n<p>This is the script to generate the payload<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>&lt;?php\n$jpg = imagecreatefromjpeg('image.jpg');\nimagejpeg($jpg, 'poc.jpg');\nimagedestroy($jpg);\n?&gt;<\/strong>\n\nThis is the hexadecimal dump for the image.jpg before the recreation. Nothing fancy here, just some junk and EXIF data.<\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-9CCnOfkPskg\/YRClt9tI6_I\/AAAAAAAAKac\/k9nm9SRB5fU98O8aV34fIeV-GwQT3-5KwCLcBGAsYHQ\/s584\/1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>So this is what happens after the recreation of JPEG file, all the EXIF data is removed and not much empty space where we can append the PHP backdoor.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-jLDcVbgtigY\/YRCl6LxcEvI\/AAAAAAAAKag\/YnSPem8cdPEcuxJYdXQ-cAB40bzS-ebHACLcBGAsYHQ\/s582\/2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>However, there are several important parts in the JPEG file format which can be exploited.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-T6g8UJaaUJ4\/YRCmHyuBZ3I\/AAAAAAAAKao\/ul4iVM1yWWE2ADUoiFryVEYfCKdVJExPwCLcBGAsYHQ\/s775\/3.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p>So according to this JPEG file format, where would be the place to put the PHP backdoor?. Search for the Start of Scan (SOS) marker which is FF DA, as you can see there are Scan Header Length and Scan Header after the SOS marker. The place to be put PHP backdoor is right after the Scan Header (00 0C 03 01 00 02 11 03 11 00 3F 00).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-nkge0FnWOAs\/YRCmTedX_JI\/AAAAAAAAKaw\/WxIlh74JuvcUKwn-sbygx7qX5I_hW1U3ACLcBGAsYHQ\/s592\/4.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>Run through the payload script again, and then the PHP backdoor will not get removed even after multiple times going through recreation process<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><strong>&lt;?php\n$jpg = imagecreatefromjpeg('poc.jpg');\nimagejpeg($jpg, 'exploit.jpg');\nimagedestroy($jpg);\n?&gt;<\/strong>\n\n<\/pre>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/dlegs\/php-jpeg-injector\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Php-Jpeg-Injector Injects php payloads into jpeg images. Related to&nbsp;this post. Exploiting PHP-GD Image Create From jpeg() Function Proof-of-concept to exploit the flaw in the PHP-GD built-in function, image create from jpeg(). Inspired by one of Reddit&#8217;s comment on my previous thread regarding exploiting the image create from gif() PHP-GD function. Warning: This POC was tested [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15741,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-6MvgA8xfxQs\/YRCpE3CY33I\/AAAAAAAAKa8\/Qxdo3eXXrQ8ukTFati7JY6Je8i5Zi4eZgCLcBGAsYHQ\/s771\/php-jpeg-injector%2B%25281%2529.png","fifu_image_alt":"Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[3997],"class_list":["post-17468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-php-jpeg-injector"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images<\/title>\n<meta name=\"description\" content=\"Php-Jpeg-Injector Injects php payloads into jpeg images. Proof-of-concept to exploit the flaw in the PHP-GD built-in function.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images\" \/>\n<meta property=\"og:description\" content=\"Php-Jpeg-Injector Injects php payloads into jpeg images. Proof-of-concept to exploit the flaw in the PHP-GD built-in function.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-13T15:02:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-6MvgA8xfxQs\/YRCpE3CY33I\/AAAAAAAAKa8\/Qxdo3eXXrQ8ukTFati7JY6Je8i5Zi4eZgCLcBGAsYHQ\/s771\/php-jpeg-injector%2B%25281%2529.png\" \/><meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-6MvgA8xfxQs\/YRCpE3CY33I\/AAAAAAAAKa8\/Qxdo3eXXrQ8ukTFati7JY6Je8i5Zi4eZgCLcBGAsYHQ\/s771\/php-jpeg-injector%2B%25281%2529.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-6MvgA8xfxQs\/YRCpE3CY33I\/AAAAAAAAKa8\/Qxdo3eXXrQ8ukTFati7JY6Je8i5Zi4eZgCLcBGAsYHQ\/s771\/php-jpeg-injector%2B%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images\",\"datePublished\":\"2021-08-13T15:02:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/\"},\"wordCount\":222,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Eut216BIyrs\/XVJq9vGU_CI\/AAAAAAAAB6M\/55bKrV8pydkMK9NOzn9ml8yrqI_TgbGmACLcBGAs\/s1600\/hackertarget%25281%2529.png\",\"keywords\":[\"Php-Jpeg-Injector\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/\",\"name\":\"Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Eut216BIyrs\/XVJq9vGU_CI\/AAAAAAAAB6M\/55bKrV8pydkMK9NOzn9ml8yrqI_TgbGmACLcBGAs\/s1600\/hackertarget%25281%2529.png\",\"datePublished\":\"2021-08-13T15:02:09+00:00\",\"description\":\"Php-Jpeg-Injector Injects php payloads into jpeg images. Proof-of-concept to exploit the flaw in the PHP-GD built-in function.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-Eut216BIyrs\/XVJq9vGU_CI\/AAAAAAAAB6M\/55bKrV8pydkMK9NOzn9ml8yrqI_TgbGmACLcBGAs\/s1600\/hackertarget%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-Eut216BIyrs\/XVJq9vGU_CI\/AAAAAAAAB6M\/55bKrV8pydkMK9NOzn9ml8yrqI_TgbGmACLcBGAs\/s1600\/hackertarget%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images","description":"Php-Jpeg-Injector Injects php payloads into jpeg images. Proof-of-concept to exploit the flaw in the PHP-GD built-in function.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/","og_locale":"en_US","og_type":"article","og_title":"Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images","og_description":"Php-Jpeg-Injector Injects php payloads into jpeg images. Proof-of-concept to exploit the flaw in the PHP-GD built-in function.","og_url":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-08-13T15:02:09+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-6MvgA8xfxQs\/YRCpE3CY33I\/AAAAAAAAKa8\/Qxdo3eXXrQ8ukTFati7JY6Je8i5Zi4eZgCLcBGAsYHQ\/s771\/php-jpeg-injector%2B%25281%2529.png","type":"","width":"","height":""},{"url":"https:\/\/1.bp.blogspot.com\/-6MvgA8xfxQs\/YRCpE3CY33I\/AAAAAAAAKa8\/Qxdo3eXXrQ8ukTFati7JY6Je8i5Zi4eZgCLcBGAsYHQ\/s771\/php-jpeg-injector%2B%25281%2529.png","width":1,"height":1,"type":"image\/jpeg"}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-6MvgA8xfxQs\/YRCpE3CY33I\/AAAAAAAAKa8\/Qxdo3eXXrQ8ukTFati7JY6Je8i5Zi4eZgCLcBGAsYHQ\/s771\/php-jpeg-injector%2B%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images","datePublished":"2021-08-13T15:02:09+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/"},"wordCount":222,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Eut216BIyrs\/XVJq9vGU_CI\/AAAAAAAAB6M\/55bKrV8pydkMK9NOzn9ml8yrqI_TgbGmACLcBGAs\/s1600\/hackertarget%25281%2529.png","keywords":["Php-Jpeg-Injector"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/","url":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/","name":"Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Eut216BIyrs\/XVJq9vGU_CI\/AAAAAAAAB6M\/55bKrV8pydkMK9NOzn9ml8yrqI_TgbGmACLcBGAs\/s1600\/hackertarget%25281%2529.png","datePublished":"2021-08-13T15:02:09+00:00","description":"Php-Jpeg-Injector Injects php payloads into jpeg images. Proof-of-concept to exploit the flaw in the PHP-GD built-in function.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/php-jpeg-injector\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-Eut216BIyrs\/XVJq9vGU_CI\/AAAAAAAAB6M\/55bKrV8pydkMK9NOzn9ml8yrqI_TgbGmACLcBGAs\/s1600\/hackertarget%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-Eut216BIyrs\/XVJq9vGU_CI\/AAAAAAAAB6M\/55bKrV8pydkMK9NOzn9ml8yrqI_TgbGmACLcBGAs\/s1600\/hackertarget%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-Eut216BIyrs\/XVJq9vGU_CI\/AAAAAAAAB6M\/55bKrV8pydkMK9NOzn9ml8yrqI_TgbGmACLcBGAs\/s1600\/hackertarget%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":11615,"url":"https:\/\/kalilinuxtutorials.com\/powerglot\/","url_meta":{"origin":17468,"position":0},"title":"Powerglot : Encodes Offensive Powershell Scripts Using Polyglots","author":"R K","date":"October 6, 2020","format":false,"excerpt":"Powerglot encodes several kind of scripts using polyglots, for example, offensive powershell scripts. It is not needed a loader to run the payload. In red-team exercises or offensive tasks, masking of payloads is usually done by using steganography, especially to avoid network level protections, being one of the most common\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2487,"url":"https:\/\/kalilinuxtutorials.com\/uploadscanner-http-file-upload-scanner\/","url_meta":{"origin":17468,"position":1},"title":"UploadScanner : HTTP file upload scanner for Burp Proxy","author":"R K","date":"September 4, 2018","format":false,"excerpt":"UploadScanner is a Burp Suite Pro extension to do security tests for HTTP file uploads. Testing web applications is a standard task for every security analyst. Various automated and semi-automated security testing tools exist to simplify the task. HTTP based file uploads are one specialised use case. However, most automated\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":6620,"url":"https:\/\/kalilinuxtutorials.com\/pixload-image-payload-creating-injecting\/","url_meta":{"origin":17468,"position":2},"title":"Pixload : Image Payload Creating\/Injecting Tools","author":"R K","date":"September 26, 2019","format":false,"excerpt":"Pixload is a set of tools for creating\/injecting payload into images. Useful references for better understanding of pixload and its use-cases: Bypassing CSP using polyglot JPEGsHacking group using Polyglot images to hide malvertising attacksEncoding Web Shells in PNG IDAT chunksAn XSS on Facebook via PNGs & Wonky Content TypesRevisiting XSS\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":8390,"url":"https:\/\/kalilinuxtutorials.com\/shell-backdoor-list\/","url_meta":{"origin":17468,"position":3},"title":"Shell Backdoor List : PHP \/ ASP Shell Backdoor List","author":"R K","date":"January 17, 2020","format":false,"excerpt":"Shell Backdoor is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, delete, or download any files on the site, or upload their\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28575,"url":"https:\/\/kalilinuxtutorials.com\/upload_bypass\/","url_meta":{"origin":17468,"position":4},"title":"Upload_Bypass_Carnage : File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!","author":"R K","date":"March 12, 2023","format":false,"excerpt":"Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques! POC video: https:\/\/www.youtube.com\/watch?v=quFoDysbDto&ab_channel=SagivMichael Installation: pip3 install -r requirements.txt Usage: upload_bypass.py [options] Options: -h, --help show this help message and exit -u URL, --url=URL Supply the login page, for example: -u http:\/\/192.168.98.200\/login.php' -s , --success Success message when upload an image,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhuiqf-Co5GwPjMWuWcWgXs47Mm6NCr3fUdQszxCpdlg-0EwTH86czgqYSPzBVD1QnSi1bUd_B_yVXoqHYIC2UWbp6pBkMiGoPqfGRgxt9nOd0t2Uqhoql7Tr2M_hTXd6rbRRzHZVUKnMrQRV1QQRb3psz9Nf1IDBuJoY0ZWUDrAvoG8siId8eZdAUd\/s16000\/Upload_Bypass.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhuiqf-Co5GwPjMWuWcWgXs47Mm6NCr3fUdQszxCpdlg-0EwTH86czgqYSPzBVD1QnSi1bUd_B_yVXoqHYIC2UWbp6pBkMiGoPqfGRgxt9nOd0t2Uqhoql7Tr2M_hTXd6rbRRzHZVUKnMrQRV1QQRb3psz9Nf1IDBuJoY0ZWUDrAvoG8siId8eZdAUd\/s16000\/Upload_Bypass.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhuiqf-Co5GwPjMWuWcWgXs47Mm6NCr3fUdQszxCpdlg-0EwTH86czgqYSPzBVD1QnSi1bUd_B_yVXoqHYIC2UWbp6pBkMiGoPqfGRgxt9nOd0t2Uqhoql7Tr2M_hTXd6rbRRzHZVUKnMrQRV1QQRb3psz9Nf1IDBuJoY0ZWUDrAvoG8siId8eZdAUd\/s16000\/Upload_Bypass.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhuiqf-Co5GwPjMWuWcWgXs47Mm6NCr3fUdQszxCpdlg-0EwTH86czgqYSPzBVD1QnSi1bUd_B_yVXoqHYIC2UWbp6pBkMiGoPqfGRgxt9nOd0t2Uqhoql7Tr2M_hTXd6rbRRzHZVUKnMrQRV1QQRb3psz9Nf1IDBuJoY0ZWUDrAvoG8siId8eZdAUd\/s16000\/Upload_Bypass.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":17479,"url":"https:\/\/kalilinuxtutorials.com\/bantam\/","url_meta":{"origin":17468,"position":5},"title":"Bantam : A PHP Backdoor Management And Generation tool\/C2 Featuring End To End Encrypted Payload Streaming Designed To Bypass WAF, IDS, SIEM Systems","author":"R K","date":"August 19, 2021","format":false,"excerpt":"Bantam is an advanced PHP backdoor management tool, with a lightweight server footprint, multi-threaded communication, and an advanced payload generation and obfuscation tool. Features end to end encryption with request unique encryption keys, and payload streaming designed to bypass WAF, IDS, SIEM systems. It incorporates several payload randomization and obfuscation\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/17468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=17468"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/17468\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15741"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=17468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=17468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=17468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}