How to Exploit a Local File Inclusion (LFI)
Complete guide on LFI vulnerability: exploitation techniques, bypasses, and methods to convert a Local File Inclusion into remote command execution.
119 articles
Complete guide on LFI vulnerability: exploitation techniques, bypasses, and methods to convert a Local File Inclusion into remote command execution.
Complete guide on exploiting PHP Wrappers in web vulnerabilities, including techniques with php://filter, zip://, data://, php://input and expect:// for LFI and XXE.
Learn to exploit blind command injection vulnerabilities by redirecting output to accessible files to read the output of executed commands.
Learn to exploit blind command injection vulnerabilities using time delays to detect successful command execution on the server.
Step-by-step solution for PortSwigger's OS command injection, simple case lab. Learn how to exploit operating system command injection vulnerabilities.
Explanation of the Shellshock vulnerability (CVE-2014-6271), its origin, how it works, and how to exploit it remotely to achieve command execution on web servers.
Learn various techniques for obtaining reverse shells on Windows systems, from netcat to PowerShell scripts to fully interactive ConPtyShell.
Learn what LocalAccountTokenFilterPolicy is in Windows, how it affects remote command execution with local administrative accounts, and how to disable it for pentesting purposes.
Complete guide to special permissions on Linux: SGID, SUID, and Sticky Bit. Learn how they work, how to identify them, and the behaviors of UID and GID in the system.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏