Sometimes, we may also come across a file upload that is initially meant to upload files such as Excel documents and photos. But there are a few ways by which we can bypass it. In this recipe, we will see how to do that.
Backdoors using webshells
How to do it...
Let's perform the following steps:
- Here, we have a web application that uploads a photo. So, let's upload an image here:

- When we upload a photo, this is what we see on the application:

- Let's upload a .txt file and see what happens. So, we create one with test as data:

- After uploading it, you can see the following message on the window. Our image has been deleted:

- This might mean our application is doing either a client-side or server-side...