We’ve all been there. You find an endpoint that makes your hacker senses tingle. A file upload form. Your mind races with possibilities — PHP shells, malicious PDFs, the works. You fire up Burp Suite, eager to claim your bounty, only to hit a wall. The error messages are clear: it’s not a file upload. It’s something else entirely.
Press enter or click to view image in full size
This is the story of one such target. It’s a masterclass in persistence, adaptability, and why you should never, ever delete a tab in Burp.
My journey started like many others: with subdomain enumeration. Amass, Subfinder, the usual tools. One subdomain stood out: invoices.corp-target.com
. It hosted a single, sleek HTML form for uploading files. Jackpot, right?
I started with the classic tests. Uploading a shell.php
. The server responded, not with a generic error, but with a verbose one: "Error: File processed as XML. Root element is missing."