Include

This challenge presents a series of interesting vulnerabilities such as Server-Side Request Forgery (SSRF), path traversal via Local File Inclusion (LFI), and log poisoning that leads to remote code execution (RCE) - present in 2 separate web applications.

We are also able to practice basic enumeration skills and post exploitation techniques to identify services that aids us in the exploitation, and provide us with a remote shell environment respectively.

Last updated