From 264f59945c14964dfd6b79302f8feee361b99169 Mon Sep 17 00:00:00 2001 From: doverh Date: Tue, 23 Apr 2024 16:05:22 -0400 Subject: [PATCH] Fix md ZIP --- .../09-Test_Upload_of_Malicious_Files.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/document/4-Web_Application_Security_Testing/10-Business_Logic_Testing/09-Test_Upload_of_Malicious_Files.md b/document/4-Web_Application_Security_Testing/10-Business_Logic_Testing/09-Test_Upload_of_Malicious_Files.md index 37f1d7fcd3..04b578bcd0 100644 --- a/document/4-Web_Application_Security_Testing/10-Business_Logic_Testing/09-Test_Upload_of_Malicious_Files.md +++ b/document/4-Web_Application_Security_Testing/10-Business_Logic_Testing/09-Test_Upload_of_Malicious_Files.md @@ -120,11 +120,11 @@ Additional testing techniques: touch ../../../../../../../../tmp/traversed 5. Open this file and a message to echo (executing this file should echo this message): echo 'Your message here' - 6. Create the zip file: - zip -r 'zip file name' 'directory name + 6. Create the ZIP file: + ZIP -r 'ZIP filename' 'directory name 7. Validate files compressed - jar -tvf 'zip file name' - 8. Load this zip file in the target application. + jar -tvf 'ZIP filename' + 8. Load this ZIP file in the target application. 9. Verify that the two files are located within different folders on the web server after the archive has been extracted. - Include a unit test to upload an infected compressed file then execute the extraction method.