Classs 10 Lab 2 ‐ Local File Inclusion - Justin-Boyd/Ethical-Hacking-Class GitHub Wiki
Task: Implement an LFI Attack
Step 1
Ensure bWAPP is running, log in to the website with your credentials, and navigate to the Bugs page.
Step 2
In the A7 – Missing Functional Level Access Control section, select Remote & Local File Inclusion (RFI/LFI), and click Hack.
Step 3
Examine the page and note there is no user input field. Select a language from the dropdown list and verify that the page outputs data.
Step 4
Inspect the HTML source code to find clues for the action. Examine the dataexchange process between the client and the server. Note there is a form that sends information to /bWAPP/rlfi.php.
Step 5
The website’s HTML code can be edited. Edit the button feature in the HTML code to insert a tag that accepts the user input
Utilize the user input to access the passwd file from the /etc directory of the server.
Step 6
The page now has an input box where code may be injected. Here, you will use ../ and /etc/passwd to access the directory and print it on the web interface