This lab contains a vulnerable image upload function. Although it checks the contents of the file to verify that it is a genuine image, it is still possible to upload and execute server-side code.
Upload a basic PHP web shell.
Use it to exfiltrate the contents of the file:
/home/carlos/secret
Submit this secret using the button provided in the lab banner.
You can log in to your own account using:
wiener:peter
I searched for common file signatures and decided to use a GIF file signature:
GIF89a
