LFI + path traversal
GET /profile.php?img=profile.png HTTP/1.1
Host: xxx.xxx.xxx.xxx:50000
User-Agent: xxx
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Cookie: connect.sid=xxxx
Upgrade-Insecure-Requests: 1
Priority: u=0, iSimple payloads
Brute force discovery

Exploring methods of exploitation
Log poisoning
1. SMTP (port 25) ~ /var/log/syslog
/var/log/syslog2. SSH (port 22) ~ /var/log/auth.log
/var/log/auth.log Interesting discovery

Last updated