From previous article, we came across to different actions performed by HTTP methods where we had described the role of PUT method which allow client to upload a file on…
In this article, we’ll be exploiting the HTTP PUT method vulnerability on one of the Metasploitable2 webserver through which you can easily upload any malicious file onto the server and…