How to Exploit a Remote File Inclusion (RFI)
Practical guide on RFI vulnerability: how to exploit Remote File Inclusion to execute remote code by including malicious files from an external server.
13 articles
Practical guide on RFI vulnerability: how to exploit Remote File Inclusion to execute remote code by including malicious files from an external server.
Complete guide on LFI vulnerability: exploitation techniques, bypasses, and methods to convert a Local File Inclusion into remote command execution.
Complete guide on exploiting PHP Wrappers in web vulnerabilities, including techniques with php://filter, zip://, data://, php://input and expect:// for LFI and XXE.
Explanation of the Shellshock vulnerability (CVE-2014-6271), its origin, how it works, and how to exploit it remotely to achieve command execution on web servers.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏