File Inclusion Vulnerability

An attacker can exploit a Local File Inclusion (LFI) vulnerability to both access and display the contents of files on the target system. In some cases, LFI may also lead to the execution of files or code, depending on the system's configuration and the presence of additional vulnerabilities.

A common way is to do log poisoning and execute the exploitable files.

Log poisoning

A resource to look at:

Cheatsheet for steps
Using FTP and HTTP request.

Log poisoning in Windows systems involves manipulating the log file's contents. For PHP-based applications, the key difference lies in the log file location.

For example, on a target running XAMPP, the Apache logs can be found in C:\xampp\apache\logs.

For Windows:

Then got the shell using POWERSHELL BASE64 code

Last updated