Part 4 - LFI & RFI Lab

Video Activity

This lesson offers a brief introduction of the LFI and RFI lab. This unit covers: 1. LFI Discovery 2. LFI Exploitation 3. RFI Discovery 4. RFI Exploitation

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
4 hours 20 minutes
Difficulty
Intermediate
CEU/CPE
5
Video Description

This lesson offers a brief introduction of the LFI and RFI lab. This unit covers: 1. LFI Discovery 2. LFI Exploitation 3. RFI Discovery 4. RFI Exploitation

Video Transcription
00:03
>> Welcome to Cybrary. I'm Raymond Evans and I will be
00:03
your subject matter expert for
00:03
Cybrary's Web App Penetration Testing course.
00:03
In this video, we will be discussing
00:03
the LFI and RFI lab.
00:03
This lab should take you about 30 minutes
00:03
to accomplish. What will be covered?
00:03
We're going to talk about LFI discovery portion of
00:03
the lab and then the LFI exploitation portion,
00:03
the RFI discovery portion of the lab and
00:03
then the RFI exploitation portion.
00:03
Using the Web for Pentesters webpage,
00:03
identify an LFI vulnerability
00:03
manually or with the Zed Attack Proxy.
00:03
I showed you how to do this manually by looking at
00:03
different files and seeing where it's calling from,
00:03
and then doing the dot dot forward slash and calling it
00:03
a file name to try to see if you can pull data from it.
00:03
Go ahead and try that out manually and try and see.
00:03
Then you should also probably do it with one of
00:03
the fuzzers as well and see how it identifies it.
00:03
Once the vulnerable page is found, the vulnerable URL,
00:03
read the ETC network file
00:03
using the LFI exploitation technique.
00:03
After that, you are going to move on an RFI.
00:03
Using the Web for Pentesters webpage,
00:03
identify an RFI vulnerability
00:03
with manually or with the Zed Attack Proxy.
00:03
Again, I showed you how to do this manually by
00:03
uploading a piece of PHP shell code or
00:03
a PHP shell exploitation tool such
00:03
as my favorite one
00:03
that I showed you in the earlier lesson.
00:03
But attempt to upload that and see
00:03
>> if you can execute it.
00:03
>> Once you have identified the vulnerability,
00:03
upload the B374K software
00:03
and download the passWD file from the target machine.
00:03
What was covered? Well, we discussed
00:03
the LFI discovery portion of the lab,
00:03
the exploitation portion of the lab for LFI.
00:03
The RFI discovery portion of the lab and
00:03
then the RFI exploitation portion as well.
00:03
Happy hacking, everyone.
Up Next
Instructed By