Automated Scanning
Fuzz the web application for exposed parameters, then try to exploit it with one of the LFI wordlists to read /flag.txt
ffuf -w burp-parameter-names.txt:FUZZ -u 'http://SERVER_IP:SERVER_PORT/index.php?FUZZ' -fs 2309




Last updated