In this chapter, we're going to have a look at file upload vulnerabilities. This is the simplest type of vulnerability because it allows us to upload any type of file. For example, if the target computer can understand PHP, then we can upload any PHP file or a PHP shell and get full control over the target computer.
If the target computer or the target server understands Python then we can just upload Python code or Python Shell. We can create these shells using Veil-Evasion or Metasploit, or we can use our own PHP or Python Shell.
In the next section, we are going to have a look at a tool called Weevely that generates PHP shells and allows us to gain access to and do a number of cool things on the target computer.