I am pursuing - “Threat Hunting: Hunting the Network & Network Analysis” training and want to know How to ingest or implant web shells ?
I want to do this in the lab. I have read enough theory about web shells and how web server / web application can be exploited to upload web shells but I want to do the hands on. I want to see how I can exploit a vulnerability and upload (and execute) a web shell.
Can someone please guide ?