Include
This challenge presents a series of interesting vulnerabilities such as Server-Side Request Forgery (SSRF), path traversal via Local File Inclusion (LFI), and log poisoning that leads to remote code execution (RCE) - present in 2 separate web applications.
We are also able to practice basic enumeration skills and post exploitation techniques to identify services that aids us in the exploitation, and provide us with a remote shell environment respectively.
Last updated