LFI ๐ŸŽƒ

  • Linux File Inclussion

    • Check the url adding parameter file



  • If the backend is filtering by checking the input, try this:

  • Check out the &ext variable and put it empty because it won't get the file extension


  • Log file contamination


  • Exploit the User-Agent Field:

    • First create a shell like the PentestMonkey one

    • Create a python server

    • Load the petition (like log file contamination petition) and capture it with BurpSuite

    • Modify the User-Agent field with this command:

  • Then access to http://IP/shell.php and you got the reverse shell


When we can echo commands try and it's using a regex like: /[#!@%^&*()$_=\[\]\';,{}:>?~\\\\]/ try:

Last updated