The Hacker Recipes
Ctrlk
GitHubTwitterExegolTools
  • Introduction
  • Active Directory
    • Reconnaissance
    • Movement
    • Persistence
  • Web services
    • Reconnaissance
    • Configuration
    • Accounts and sessions
    • User inputs
      • File inclusion
        • LFI to RCE
          • logs poisoning
          • phpinfo
          • file upload
          • PHP wrappers and streams
          • PHP session
          • /proc
        • RFI to RCE
      • Unrestricted file upload
      • SQL injection
      • XSS (Cross-Site Scripting)
      • CSRF (Cross-Site Request Forgery)
      • SSRF (Server-Side Request Forgery)
      • IDOR (Insecure Direct Object Reference)
      • ORED Open redirect
      • Content-Type juggling
      • XXE injection
      • Insecure JSON Web Tokens
      • 🛠️HTTP parameter pollution
      • 🛠️SSTI (Server-Side Template Injection)
      • 🛠️Insecure deserialization
      • 🛠️CRLF injection
      • 🛠️Arbitrary file download
      • 🛠️Directory traversal
      • 🛠️Null-byte injection
  • Systems & services
    • Reconnaissance
    • Initial access (protocols)
    • Initial access (phishing)
    • Privilege escalation
    • Pivoting
  • Evasion
    • (AV) Anti-Virus
    • 🛠️(EDR) Endpoint Detection and Response
  • 🛠️Physical
    • Locks
    • Networking
    • Machines
    • Super secret zones
  • 🛠️Intelligence gathering
    • CYBINT
    • OSINT
    • GEOINT
  • 🛠️RADIO
    • RFID
    • Bluetooth
    • Wi-Fi
    • Wireless keyboard/mouse
  • 🛠️mobile apps
    • Android
    • iOS
Powered by GitBook
On this page

Was this helpful?

  1. Web services
  2. User inputs
  3. File inclusion

LFI to RCE

logs poisoningphpinfofile uploadPHP wrappers and streamsPHP session/proc
PreviousFile inclusionNextlogs poisoning

Last updated 2 years ago

Was this helpful?