How to Exploit a Remote File Inclusion (RFI)
Practical guide on RFI vulnerability: how to exploit Remote File Inclusion to execute remote code by including malicious files from an external server.
123 articles
Practical guide on RFI vulnerability: how to exploit Remote File Inclusion to execute remote code by including malicious files from an external server.
Learn to exploit file upload vulnerabilities by bypassing Content-Type restrictions to execute malicious PHP code.
Learn to exploit file upload vulnerabilities to achieve remote code execution by uploading a PHP web shell.
Learn to detect blind command injection vulnerabilities using out-of-band techniques with DNS lookups to external servers.
Complete guide on LFI vulnerability: exploitation techniques, bypasses, and methods to convert a Local File Inclusion into remote command execution.
Complete guide on exploiting PHP Wrappers in web vulnerabilities, including techniques with php://filter, zip://, data://, php://input and expect:// for LFI and XXE.
Learn to exploit blind command injection vulnerabilities by redirecting output to accessible files to read the output of executed commands.
Learn to exploit blind command injection vulnerabilities using time delays to detect successful command execution on the server.
Step-by-step solution for PortSwigger's OS command injection, simple case lab. Learn how to exploit operating system command injection vulnerabilities.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏