FILE INCLUSION / DIRECTORY TRAVERSAL HTB

preview_player
Показать описание
Using the file inclusion find the name of a user on the system that starts with "b".
Using the LFI to RCE vulnerability run the command 'cat /etc/issue'. Submit the OS version as your answer (i.e. Ubuntu 14.04.2 LTS).

Assess the web application and use a variety of techniques to gain remote code execution and find a flag in the / root directory of the file system. Submit the contents of the flag as your answer.
Рекомендации по теме
Комментарии
Автор

Thank you! Good idea not showing the actual flag itself and encouraging people to go through the lab. 👍

IgorKolotygin
Автор

Thank you, I was stuck at the wrapper. My brain got real smooth and didn't try index. The rest was easy sailing.

driklol
Автор

It's not working anymore. The PHP code gets filtered and there is no cmd output.

adrianmortzun
Автор

The unique technique combines, very useful 10x bro 10x.

kikotesting
Автор

i cant even read config file like you did, even i tried to fuzz the web, i though the same way as you did but i dont get the answer like you did

official_ardi
Автор

DAMM!! god bless you!! suscrito, vergacion!!

villanafm
Автор

How the fuck were we supposed to know to look for that ilf_admin directory?

ollicron
Автор

first need to find session next and next for command e.g / this need every command first encode <?php system($_GET["cmd"]);?> and next command

ubica
Автор

brooo this is not working
i go this output
HTB{n3v3r_tru$t_u$3r_!nput}

digitalmarketingclass