7 ways to Exploit RFI Vulnerability
In this article you will learn how to hack any web application server if it is suffering from remote file inclusion vulnerability. I have performed RFI attack using seven different techniques to exploit any web server. Here I have targeted BWAPP which a buggy web application server to perform all these attack.
Remote File Inclusion (also known as RFI) is the process of including remote files through the exploiting of vulnerable inclusion procedures implemented in the application. This vulnerability occurs, for example, when a page receives, as input, the path to the file that has to be included and this input is not properly sanitized, allowing external URL to be injected. Although most examples point to vulnerable PHP scripts, we should keep in mind that it is also common in other technologies such as JSP, ASP and others.
For more details visit OWASP.org
Let’s Begin!!!
Basic RFI Attack
Open target IP in the browser and login inside BWAPP as bee: bug now choose the bug remote & local file Inclusion then click on hack.
Full Article Read here
LinkedIn Top Voice, IT Security Architect, DevSecOps Expert, Cloud Security Expert, IOT Security, Cyber Security Consultant, Automation, Security Risk & Compliance Expert, TOGAF 10, IT Security Manager ?? ????
8 å¹´This is injecting payload for reverse shell